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"], 0x2040}, 0x24000010) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x107, 0x8, &(0x7f0000000000), 0x4) recvmsg$kcm(r1, &(0x7f0000002940)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0, 0x2b2}, 0x800000024000001) [ 295.502389][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 295.508283][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 295.512507][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 295.519910][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 295.896236][ T9749] IPVS: ftp: loaded support on port[0] = 21 03:59:52 executing program 3: r0 = socket$kcm(0xa, 0x7, 0x0) setsockopt$sock_attach_bpf(r0, 0x10d, 0x2, &(0x7f0000000000)=r0, 0x4) [ 295.982454][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 295.988389][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:59:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x7) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="160000001a0081aee4050c00000f00fe078bc36f1600", 0x16}], 0x1}, 0x0) socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r0, &(0x7f0000002b40)={0x0, 0x0, &(0x7f00000029c0)}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000100)={'ipddp0\x00', @remote}) recvmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[{0x0}], 0x1}, 0x0) recvmsg(r0, &(0x7f000000aa80)={0x0, 0x0, 0x0}, 0x40000120) [ 296.062370][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 296.068388][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:59:52 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000380)=[@mark={{0x14}}], 0x18}, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f0000000380)='./file0/../file0\x00', 0x0, 0x210}, 0xffffffffffffffe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unlink(&(0x7f0000000780)='./file0/../file0\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x64043, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(r4, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000003c0)={r4}) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x0) sendmsg$kcm(r6, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x5, 0xffffffffffffffdf, 0x1, 0xdfe0, 0x0, 0xfffffffffffffffe, 0x400, 0x1, 0x40c7, 0xb1a4, 0x3, 0x0, 0x0, 0x7, 0xabd, 0x1, 0x0, 0x1, 0xfff, 0x9, 0x5, 0xc300000, 0x80000000, 0xbd, 0x74, 0x979e, 0x2, 0x8, 0x7, 0x20d400000, 0x10000, 0x0, 0x241b40e5, 0x0, 0x0, 0x2, 0x0, 0xfb, 0x1, @perf_config_ext={0xc2, 0xf9}, 0x1152, 0x453, 0x2, 0x2, 0x6, 0xffff}, 0xffffffffffffffff, 0x4, r5, 0xa) openat$cgroup_ro(r2, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) close(r1) [ 296.729684][ T21] device bridge_slave_1 left promiscuous mode [ 296.738545][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.794549][ T21] device bridge_slave_0 left promiscuous mode [ 296.802534][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.861351][ T21] device bridge_slave_1 left promiscuous mode [ 296.882474][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.934826][ T21] device bridge_slave_0 left promiscuous mode [ 296.941194][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.215971][ T21] device hsr_slave_1 left promiscuous mode [ 300.259147][ T21] device hsr_slave_0 left promiscuous mode [ 300.326497][ T21] team0 (unregistering): Port device team_slave_1 removed [ 300.341048][ T21] team0 (unregistering): Port device team_slave_0 removed [ 300.354039][ T21] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 300.401771][ T21] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 300.508177][ T21] bond0 (unregistering): Released all slaves [ 300.646327][ T21] device hsr_slave_1 left promiscuous mode [ 300.735927][ T21] device hsr_slave_0 left promiscuous mode [ 300.788684][ T21] team0 (unregistering): Port device team_slave_1 removed [ 300.800858][ T21] team0 (unregistering): Port device team_slave_0 removed [ 300.813933][ T21] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 300.869448][ T21] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 300.982141][ T21] bond0 (unregistering): Released all slaves [ 301.157609][ T9749] chnl_net:caif_netlink_parms(): no params data found [ 301.197940][ T9749] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.205279][ T9749] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.213139][ T9749] device bridge_slave_0 entered promiscuous mode [ 301.221227][ T9749] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.228612][ T9749] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.236727][ T9749] device bridge_slave_1 entered promiscuous mode [ 301.259645][ T9749] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 301.270659][ T9749] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 301.290691][ T9749] team0: Port device team_slave_0 added [ 301.300185][ T9749] team0: Port device team_slave_1 added [ 301.355243][ T9749] device hsr_slave_0 entered promiscuous mode [ 301.402849][ T9749] device hsr_slave_1 entered promiscuous mode [ 301.485710][ T9749] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.493164][ T9749] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.500477][ T9749] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.507635][ T9749] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.630949][ T9749] 8021q: adding VLAN 0 to HW filter on device bond0 [ 301.646575][ T9385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 301.655816][ T9385] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.665568][ T9385] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.689827][ T9749] 8021q: adding VLAN 0 to HW filter on device team0 [ 301.702511][ T9385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 301.711021][ T9385] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.718202][ T9385] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.746541][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 301.756005][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.763151][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.790577][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 301.800036][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 301.830147][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 301.841226][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 301.856370][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 301.869422][ T9749] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 301.911220][ T9749] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 302.129520][ T9792] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 302.160431][ T9792] CPU: 0 PID: 9792 Comm: syz-executor.2 Not tainted 5.2.0-rc2+ #23 [ 302.168548][ T9792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.178639][ T9792] Call Trace: [ 302.182035][ T9792] dump_stack+0x172/0x1f0 [ 302.186380][ T9792] dump_header+0x10f/0xb6c [ 302.190807][ T9792] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 302.196656][ T9792] ? ___ratelimit+0x60/0x595 [ 302.201288][ T9792] ? do_raw_spin_unlock+0x57/0x270 [ 302.206419][ T9792] oom_kill_process.cold+0x10/0x15 [ 302.211539][ T9792] out_of_memory+0x79a/0x1280 [ 302.216241][ T9792] ? retint_kernel+0x2b/0x2b [ 302.220836][ T9792] ? oom_killer_disable+0x280/0x280 [ 302.226146][ T9792] mem_cgroup_out_of_memory+0x1ca/0x230 [ 302.231708][ T9792] ? memcg_event_wake+0x230/0x230 [ 302.236746][ T9792] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 302.242558][ T9792] ? cgroup_file_notify+0x140/0x1b0 [ 302.247767][ T9792] memory_max_write+0x169/0x300 [ 302.252629][ T9792] ? mem_cgroup_write+0x360/0x360 [ 302.257664][ T9792] cgroup_file_write+0x241/0x790 [ 302.262612][ T9792] ? mem_cgroup_write+0x360/0x360 [ 302.267641][ T9792] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 302.273287][ T9792] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 302.278930][ T9792] kernfs_fop_write+0x2b8/0x480 [ 302.283791][ T9792] __vfs_write+0x8a/0x110 [ 302.288122][ T9792] ? kernfs_fop_open+0xd80/0xd80 [ 302.293071][ T9792] vfs_write+0x20c/0x580 [ 302.297324][ T9792] ksys_write+0x14f/0x290 [ 302.301655][ T9792] ? __ia32_sys_read+0xb0/0xb0 [ 302.306427][ T9792] ? do_syscall_64+0x26/0x680 [ 302.311106][ T9792] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.317180][ T9792] ? do_syscall_64+0x26/0x680 [ 302.321866][ T9792] __x64_sys_write+0x73/0xb0 [ 302.326465][ T9792] do_syscall_64+0xfd/0x680 [ 302.330978][ T9792] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.336868][ T9792] RIP: 0033:0x4592c9 [ 302.340764][ T9792] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.362024][ T9792] RSP: 002b:00007f900b6d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 302.370447][ T9792] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 302.378424][ T9792] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 302.386402][ T9792] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 302.394382][ T9792] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f900b6d56d4 [ 302.402368][ T9792] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 302.421999][ T9792] memory: usage 3280kB, limit 0kB, failcnt 198075 [ 302.432266][ T9792] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 302.440198][ T9792] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 302.447701][ T9792] Memory cgroup stats for /syz2: cache:0KB rss:2120KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2120KB inactive_file:0KB active_file:0KB unevictable:0KB [ 302.472201][ T9792] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=9791,uid=0 [ 302.490815][ T9792] Memory cgroup out of memory: Killed process 9791 (syz-executor.2) total-vm:72844kB, anon-rss:2136kB, file-rss:34816kB, shmem-rss:0kB [ 302.508244][ T1044] oom_reaper: reaped process 9791 (syz-executor.2), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB 03:59:59 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r7, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffb4) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) write$cgroup_int(r6, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 03:59:59 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000240)=ANY=[], 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[@ANYRESHEX=r2, @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRESDEC=r3, @ANYRESDEC=r3, @ANYRES32=0x0, @ANYRESOCT, @ANYRESDEC=r0], @ANYRESHEX=r3, @ANYPTR64], 0x34) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r3, r2}) write$cgroup_int(r3, &(0x7f0000000200), 0x42400) write$cgroup_subtree(r3, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 03:59:59 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = perf_event_open(&(0x7f0000000580)={0x7, 0x70, 0x3, 0x7, 0x9, 0x0, 0x0, 0x80000000, 0x80, 0x1, 0x81, 0x20, 0x4, 0x5, 0x8001, 0xff3a, 0x1ff, 0x40, 0x7, 0x3, 0x0, 0x0, 0x7, 0x8, 0x2, 0x1ff, 0x1, 0xff00000000, 0x0, 0x8, 0xdc, 0x0, 0x4, 0x3, 0x7, 0x80000001, 0x7, 0x4, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0x9}, 0x400, 0xfffffffffffffff8, 0x100000001, 0x6, 0x1ff, 0x200, 0xea}, 0x0, 0xa, 0xffffffffffffffff, 0x8) perf_event_open$cgroup(&(0x7f00000004c0)={0x7, 0x70, 0x100, 0x1, 0xe6, 0x2, 0x0, 0xfffffffffffffffa, 0x0, 0xd, 0x3, 0x5, 0x3ff, 0x80000000, 0x4, 0x6, 0xe4, 0x6, 0x10001, 0x5, 0x3, 0x100000000, 0x9, 0x9, 0x7fffffff, 0x9, 0x8001, 0x7165f479, 0x3, 0xffff, 0x3ff, 0x7, 0x5, 0x9, 0xfffffffffffffff7, 0x8, 0x9, 0x2, 0x0, 0x400000000000, 0x1, @perf_bp={&(0x7f0000000280), 0x8}, 0x800, 0x4, 0x7ff, 0x8, 0x6, 0x0, 0x8}, r1, 0x10, r2, 0x8) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)) socketpair(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f000000d6c0)={&(0x7f000000d2c0)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d640)=[{&(0x7f000000d340)=""/8, 0x8}, {&(0x7f000000d380)=""/76, 0x4c}, {&(0x7f000000d400)=""/193, 0xc1}, {&(0x7f000000d500)=""/102, 0x66}, {&(0x7f000000d580)=""/48, 0x30}, {&(0x7f000000d5c0)=""/105, 0x69}], 0x6}, 0x2000) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000d700), 0x4) bpf$MAP_CREATE(0x0, &(0x7f000000d740)={0x7, 0x9, 0x5f, 0x15ea000000000, 0x2, r2, 0xa90, [], r4, r5, 0x1}, 0x3c) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup(r6, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x402002100000004b, 0xffffffffffffff01, 0x0, 0x6}, 0x3c) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000600)='/dev/net/tun\x00', 0x40, 0x0) ioctl$TUNGETVNETHDRSZ(r7, 0x800454d7, &(0x7f0000000640)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000480)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x480d) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) ioctl$TUNATTACHFILTER(r7, 0x401054d5, &(0x7f00000008c0)={0x1, &(0x7f0000000880)=[{0x5, 0x100000000, 0x6, 0xe000}]}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0xc0185879, 0x20000002) socketpair(0x8, 0x3, 0x3, &(0x7f0000000240)) socketpair(0x1a, 0x2, 0xffffffff, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$tipc(r9, &(0x7f0000000840)={&(0x7f0000000680)=@nameseq={0x1e, 0x1, 0xc17d941c7db22cbd, {0x43, 0x4, 0x1}}, 0x10, &(0x7f0000000800)=[{&(0x7f00000006c0)="5b2ef9f3cbf26908d81b75cebcbe3cdc775846058ff5e5c2aafa6fc0d0e98761d83066043ec8293d40a8400dd53dd5c90ce00aef75f0a4157abc963d9876386c6a41565f183888da94074e836094ca639bcd7ef57030a128f94759400001e1e56a3ecfbc456ec38eb013dcecede9513550eecb1fbc52034908e64a1f0e7e8100d25f570313c364dec96426a6db072a869f027a5a332efc1342fd69eb3ccf324c1900fb99902b1dca07", 0xa9}, {&(0x7f0000000780)="6684a9afa8e836053e62d40b755b8f0a2054a60508db0f01d25fe9c52b7db1ec65c72327eed1396b7fb41c923f2a6e5844ba081c819d411f3f1844240e43d985ce94c7a9b75fe1dbf3fca3d49bd1ac0d7d577a3cd8e7b5a97a22b3c63c6a9c4ea83a862ef16f31e540b8a4a0ed48c73ba33c", 0x72}], 0x2}, 0x20004010) 03:59:59 executing program 1: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab1, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x2, 0x0, 0x3, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='cpuacct.usage_all\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000300)={&(0x7f0000000440)=@pppoe={0x18, 0x0, {0x2, @random="1250c8010805", 'batadv0\x00'}}, 0x80, 0x0}, 0x4000040) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) write$cgroup_type(r2, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) socketpair(0x15, 0x3, 0x2, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580), 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') openat$cgroup_ro(r1, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000000)={0x5, 0x70, 0x2, 0xfffffffffffff000, 0x1, 0x2, 0x0, 0x5, 0xf2004, 0x6, 0x80000001, 0xa7c, 0x8, 0x9, 0xfff, 0x7, 0x7f, 0x4, 0xc9, 0x1, 0x6, 0xffffffff, 0x9, 0x6, 0x4, 0xc9, 0x7f, 0xfd09, 0x5, 0x4, 0xfffffffffffffff9, 0x348b, 0x3, 0x7, 0x8001, 0xff, 0x63, 0x94c, 0x0, 0x2, 0x4, @perf_config_ext={0x0, 0x800000000}, 0x100, 0x1, 0x4, 0xd, 0x2, 0x1000, 0x10000}) sendmsg$kcm(r6, 0x0, 0x3fffffffc) socketpair(0x1, 0x1, 0x0, &(0x7f0000000380)) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r8, 0x400454d0, 0x3) r9 = gettid() perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x2, 0x5, 0x0, 0x9, 0x0, 0x159a, 0x200, 0x1, 0x6, 0x80000001, 0x2, 0x3, 0x2, 0x1, 0x200, 0x1, 0x4b5932d8, 0x9, 0xffffffff, 0x1, 0x80, 0x3, 0x1, 0x5, 0x1, 0x5, 0xa6, 0x5, 0x100000001, 0x8, 0x1, 0x2, 0x6, 0x8, 0x0, 0x8001, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x80}, 0x480, 0x1, 0x3, 0x0, 0x20b9, 0x3f, 0x14}, r9, 0x0, r7, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r9, r7, 0x0, 0x19, &(0x7f0000000200)='\\procem0vboxnet1&nodev\x1e\'\x00'}, 0x30) gettid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) sendmsg(r4, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="9ef4687d0d5b890825ebdec388abb5889fabb3bb7395ce716b62a59287b6fbb75bc0cee1af67a7467c3c88bc8074500e5725ac5ad624dabed0c02032ec31f45c9652f2feafaffeec313f81c7dcaa3b36bdd6a88cba1520e9a9ed58d571babe499175", 0x62}], 0x1}, 0x8001) 03:59:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[], &(0x7f00000001c0)=""/4096, 0x1a, 0xffffffffffffff9a, 0x1}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x709d02, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000080)=0xfffffffffffffff9) 03:59:59 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000380)=[@mark={{0x14}}], 0x18}, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f0000000380)='./file0/../file0\x00', 0x0, 0x210}, 0xffffffffffffffe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unlink(&(0x7f0000000780)='./file0/../file0\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x64043, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(r4, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000003c0)={r4}) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x0) sendmsg$kcm(r6, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x5, 0xffffffffffffffdf, 0x1, 0xdfe0, 0x0, 0xfffffffffffffffe, 0x400, 0x1, 0x40c7, 0xb1a4, 0x3, 0x0, 0x0, 0x7, 0xabd, 0x1, 0x0, 0x1, 0xfff, 0x9, 0x5, 0xc300000, 0x80000000, 0xbd, 0x74, 0x979e, 0x2, 0x8, 0x7, 0x20d400000, 0x10000, 0x0, 0x241b40e5, 0x0, 0x0, 0x2, 0x0, 0xfb, 0x1, @perf_config_ext={0xc2, 0xf9}, 0x1152, 0x453, 0x2, 0x2, 0x6, 0xffff}, 0xffffffffffffffff, 0x4, r5, 0xa) openat$cgroup_ro(r2, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) close(r1) [ 302.729411][ T9749] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 302.778701][ T9749] CPU: 0 PID: 9749 Comm: syz-executor.2 Not tainted 5.2.0-rc2+ #23 [ 302.786669][ T9749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.796815][ T9749] Call Trace: [ 302.800119][ T9749] dump_stack+0x172/0x1f0 [ 302.804732][ T9749] dump_header+0x10f/0xb6c [ 302.809158][ T9749] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 302.814986][ T9749] ? ___ratelimit+0x60/0x595 [ 302.819593][ T9749] ? do_raw_spin_unlock+0x57/0x270 [ 302.824799][ T9749] oom_kill_process.cold+0x10/0x15 [ 302.829925][ T9749] out_of_memory+0x79a/0x1280 [ 302.834611][ T9749] ? lock_downgrade+0x880/0x880 [ 302.839494][ T9749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.845741][ T9749] ? oom_killer_disable+0x280/0x280 [ 302.850960][ T9749] ? find_held_lock+0x35/0x130 [ 302.855822][ T9749] mem_cgroup_out_of_memory+0x1ca/0x230 [ 302.861371][ T9749] ? memcg_event_wake+0x230/0x230 [ 302.866405][ T9749] ? do_raw_spin_unlock+0x57/0x270 [ 302.871518][ T9749] ? _raw_spin_unlock+0x2d/0x50 [ 302.876387][ T9749] try_charge+0x102c/0x15c0 [ 302.881361][ T9749] ? find_held_lock+0x35/0x130 [ 302.886222][ T9749] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 302.891869][ T9749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.901127][ T9749] ? kasan_check_read+0x11/0x20 [ 302.909828][ T9749] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 302.915375][ T9749] mem_cgroup_try_charge+0x24d/0x5e0 [ 302.920673][ T9749] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 302.926336][ T9749] __handle_mm_fault+0x1e1a/0x3eb0 [ 302.931475][ T9749] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 302.937022][ T9749] ? find_held_lock+0x35/0x130 [ 302.941795][ T9749] ? handle_mm_fault+0x292/0xa90 [ 302.946748][ T9749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.953000][ T9749] ? kasan_check_read+0x11/0x20 [ 302.957876][ T9749] handle_mm_fault+0x3b7/0xa90 [ 302.962651][ T9749] __do_page_fault+0x5ef/0xda0 [ 302.967604][ T9749] do_page_fault+0x71/0x57d [ 302.972119][ T9749] ? page_fault+0x8/0x30 [ 302.976360][ T9749] page_fault+0x1e/0x30 [ 302.980514][ T9749] RIP: 0033:0x42f81c [ 302.984495][ T9749] Code: 83 c0 17 41 55 41 54 55 53 48 89 c5 48 83 e5 f0 48 89 fb 48 81 ec 98 00 00 00 48 83 f8 20 b8 20 00 00 00 48 0f 42 e8 48 85 ff <48> 89 74 24 08 0f 84 3a 08 00 00 48 3b 2d 4a 57 64 00 77 70 89 ef [ 303.004207][ T9749] RSP: 002b:00007ffc163adff0 EFLAGS: 00010202 [ 303.010359][ T9749] RAX: 0000000000000020 RBX: 0000000000714640 RCX: 0000000000458634 [ 303.018347][ T9749] RDX: 00007ffc163ae0e0 RSI: 0000000000008030 RDI: 0000000000714640 [ 303.027124][ T9749] RBP: 0000000000008040 R08: 0000000000000001 R09: 000055555613c940 [ 303.035573][ T9749] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc163af2c0 [ 303.043720][ T9749] R13: 00007ffc163af2b0 R14: 0000000000000000 R15: 00007ffc163af2c0 03:59:59 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000380)=[@mark={{0x14}}], 0x18}, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f0000000380)='./file0/../file0\x00', 0x0, 0x210}, 0xffffffffffffffe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unlink(&(0x7f0000000780)='./file0/../file0\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x64043, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(r4, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000003c0)={r4}) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x0) sendmsg$kcm(r6, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x5, 0xffffffffffffffdf, 0x1, 0xdfe0, 0x0, 0xfffffffffffffffe, 0x400, 0x1, 0x40c7, 0xb1a4, 0x3, 0x0, 0x0, 0x7, 0xabd, 0x1, 0x0, 0x1, 0xfff, 0x9, 0x5, 0xc300000, 0x80000000, 0xbd, 0x74, 0x979e, 0x2, 0x8, 0x7, 0x20d400000, 0x10000, 0x0, 0x241b40e5, 0x0, 0x0, 0x2, 0x0, 0xfb, 0x1, @perf_config_ext={0xc2, 0xf9}, 0x1152, 0x453, 0x2, 0x2, 0x6, 0xffff}, 0xffffffffffffffff, 0x4, r5, 0xa) openat$cgroup_ro(r2, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) close(r1) 03:59:59 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000380)=[@mark={{0x14}}], 0x18}, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f0000000380)='./file0/../file0\x00', 0x0, 0x210}, 0xffffffffffffffe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unlink(&(0x7f0000000780)='./file0/../file0\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x64043, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(r4, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000003c0)={r4}) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x0) sendmsg$kcm(r6, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x5, 0xffffffffffffffdf, 0x1, 0xdfe0, 0x0, 0xfffffffffffffffe, 0x400, 0x1, 0x40c7, 0xb1a4, 0x3, 0x0, 0x0, 0x7, 0xabd, 0x1, 0x0, 0x1, 0xfff, 0x9, 0x5, 0xc300000, 0x80000000, 0xbd, 0x74, 0x979e, 0x2, 0x8, 0x7, 0x20d400000, 0x10000, 0x0, 0x241b40e5, 0x0, 0x0, 0x2, 0x0, 0xfb, 0x1, @perf_config_ext={0xc2, 0xf9}, 0x1152, 0x453, 0x2, 0x2, 0x6, 0xffff}, 0xffffffffffffffff, 0x4, r5, 0xa) openat$cgroup_ro(r2, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) close(r1) [ 303.403424][ T9749] memory: usage 896kB, limit 0kB, failcnt 198093 [ 303.410078][ T9749] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 303.418419][ T9749] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 303.426747][ T9749] Memory cgroup stats for /syz2: cache:0KB rss:64KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:64KB inactive_file:0KB active_file:0KB unevictable:0KB [ 303.506596][ T9749] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=9749,uid=0 [ 303.624447][ T9749] Memory cgroup out of memory: Killed process 9749 (syz-executor.2) total-vm:72448kB, anon-rss:68kB, file-rss:34828kB, shmem-rss:0kB 04:00:00 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000380)=[@mark={{0x14}}], 0x18}, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f0000000380)='./file0/../file0\x00', 0x0, 0x210}, 0xffffffffffffffe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unlink(&(0x7f0000000780)='./file0/../file0\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x64043, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(r4, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000003c0)={r4}) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x0) sendmsg$kcm(r6, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x5, 0xffffffffffffffdf, 0x1, 0xdfe0, 0x0, 0xfffffffffffffffe, 0x400, 0x1, 0x40c7, 0xb1a4, 0x3, 0x0, 0x0, 0x7, 0xabd, 0x1, 0x0, 0x1, 0xfff, 0x9, 0x5, 0xc300000, 0x80000000, 0xbd, 0x74, 0x979e, 0x2, 0x8, 0x7, 0x20d400000, 0x10000, 0x0, 0x241b40e5, 0x0, 0x0, 0x2, 0x0, 0xfb, 0x1, @perf_config_ext={0xc2, 0xf9}, 0x1152, 0x453, 0x2, 0x2, 0x6, 0xffff}, 0xffffffffffffffff, 0x4, r5, 0xa) openat$cgroup_ro(r2, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) close(r1) [ 303.721184][ T1044] oom_reaper: reaped process 9749 (syz-executor.2), now anon-rss:0kB, file-rss:33932kB, shmem-rss:0kB 04:00:00 executing program 1: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab1, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x2, 0x0, 0x3, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='cpuacct.usage_all\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000300)={&(0x7f0000000440)=@pppoe={0x18, 0x0, {0x2, @random="1250c8010805", 'batadv0\x00'}}, 0x80, 0x0}, 0x4000040) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) write$cgroup_type(r2, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) socketpair(0x15, 0x3, 0x2, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580), 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') openat$cgroup_ro(r1, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000000)={0x5, 0x70, 0x2, 0xfffffffffffff000, 0x1, 0x2, 0x0, 0x5, 0xf2004, 0x6, 0x80000001, 0xa7c, 0x8, 0x9, 0xfff, 0x7, 0x7f, 0x4, 0xc9, 0x1, 0x6, 0xffffffff, 0x9, 0x6, 0x4, 0xc9, 0x7f, 0xfd09, 0x5, 0x4, 0xfffffffffffffff9, 0x348b, 0x3, 0x7, 0x8001, 0xff, 0x63, 0x94c, 0x0, 0x2, 0x4, @perf_config_ext={0x0, 0x800000000}, 0x100, 0x1, 0x4, 0xd, 0x2, 0x1000, 0x10000}) sendmsg$kcm(r6, 0x0, 0x3fffffffc) socketpair(0x1, 0x1, 0x0, &(0x7f0000000380)) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r8, 0x400454d0, 0x3) r9 = gettid() perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x2, 0x5, 0x0, 0x9, 0x0, 0x159a, 0x200, 0x1, 0x6, 0x80000001, 0x2, 0x3, 0x2, 0x1, 0x200, 0x1, 0x4b5932d8, 0x9, 0xffffffff, 0x1, 0x80, 0x3, 0x1, 0x5, 0x1, 0x5, 0xa6, 0x5, 0x100000001, 0x8, 0x1, 0x2, 0x6, 0x8, 0x0, 0x8001, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x80}, 0x480, 0x1, 0x3, 0x0, 0x20b9, 0x3f, 0x14}, r9, 0x0, r7, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r9, r7, 0x0, 0x19, &(0x7f0000000200)='\\procem0vboxnet1&nodev\x1e\'\x00'}, 0x30) gettid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) sendmsg(r4, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="9ef4687d0d5b890825ebdec388abb5889fabb3bb7395ce716b62a59287b6fbb75bc0cee1af67a7467c3c88bc8074500e5725ac5ad624dabed0c02032ec31f45c9652f2feafaffeec313f81c7dcaa3b36bdd6a88cba1520e9a9ed58d571babe499175", 0x62}], 0x1}, 0x8001) 04:00:00 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000380)=[@mark={{0x14}}], 0x18}, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f0000000380)='./file0/../file0\x00', 0x0, 0x210}, 0xffffffffffffffe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unlink(&(0x7f0000000780)='./file0/../file0\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x64043, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(r4, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000003c0)={r4}) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x0) sendmsg$kcm(r6, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x5, 0xffffffffffffffdf, 0x1, 0xdfe0, 0x0, 0xfffffffffffffffe, 0x400, 0x1, 0x40c7, 0xb1a4, 0x3, 0x0, 0x0, 0x7, 0xabd, 0x1, 0x0, 0x1, 0xfff, 0x9, 0x5, 0xc300000, 0x80000000, 0xbd, 0x74, 0x979e, 0x2, 0x8, 0x7, 0x20d400000, 0x10000, 0x0, 0x241b40e5, 0x0, 0x0, 0x2, 0x0, 0xfb, 0x1, @perf_config_ext={0xc2, 0xf9}, 0x1152, 0x453, 0x2, 0x2, 0x6, 0xffff}, 0xffffffffffffffff, 0x4, r5, 0xa) openat$cgroup_ro(r2, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) close(r1) 04:00:00 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000200)='memory.current\x00', 0x2761, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000240)={0x7, 0x70, 0x22, 0x5, 0x9, 0x1f, 0x0, 0x9, 0xc, 0x8, 0x80000000, 0x1, 0x7, 0x1, 0x69, 0x4, 0x0, 0x4, 0x7fff, 0x4, 0x5, 0x9, 0x9, 0x100000001, 0x68b, 0x8, 0x0, 0xffffffffffffb4f4, 0x1f, 0x40, 0x80000001, 0x10, 0x7, 0x4, 0x400, 0x6, 0x7fffffff, 0x400, 0x0, 0xfff, 0x4, @perf_config_ext={0x2, 0x6}, 0xc010, 0x800000000000000, 0xfff, 0xf, 0x20, 0x1, 0x100000001}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x8983, &(0x7f0000000000)={r2}) 04:00:01 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r7, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffb4) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) write$cgroup_int(r6, 0x0, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:00:01 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x99b, 0x1020000000000000, 0x4, 0x8, 0x0, 0xb6, 0x2008, 0x8, 0x6, 0x400, 0xff, 0x1, 0x35a9, 0x9, 0x800000, 0x5, 0x2e8f, 0x40, 0xfff, 0x4, 0x100, 0x17fd, 0x8, 0x9, 0x7f, 0x101, 0x40, 0x100000000, 0x9, 0x10000, 0x0, 0x9, 0xfffffffffffffff8, 0x3, 0x3, 0x20, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0x8}, 0x2000, 0x0, 0xfff, 0x3, 0x2b1e960, 0x7}, 0xffffffffffffffff, 0xb, 0xffffffffffffff9c, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r1 = socket$kcm(0x10, 0x2000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="2e0000002d008182e4b1e6a9735082cf0224b0eba06ef9075b3f00169148790700d90080e2300000000000000000", 0x2e}], 0x1}, 0x0) 04:00:01 executing program 3: openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001840)=r0, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000001800)={[{0x2b, 'cpu'}, {0x2f, 'cpu'}, {0x2f, 'memory'}, {0x2f, 'io'}, {0x2d, 'io'}, {0x2b, 'memory'}, {0x2f, 'pids'}]}, 0x28) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f00000017c0)={&(0x7f0000000040)=@name={0x1e, 0x2, 0x3, {{0x42, 0x2}, 0x4}}, 0x10, &(0x7f0000001740)=[{&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000001300)="457fc2676cf591fdacd84295d27d0fdbbc2656e5008d2bd4c31fb7c9c68ba424938be6d298d68db9bea1624c8ca3093554baac2966df4a206e9b8660691e2e71d52a71035549d6f85142f379f5284e10681826670d5299cba83a7abab6ba6e46952d3b1c50111c37628b49e6de2b4da4b9f0a582141d37d9ffb925a2c330e33c4052e9e17860d6302af9ea5401065542afec68f6b1b646756f7ef86bb61ac4217dc2415afb5d02eab6a51eb15b3a437c42111b59bf7663cf4a6322f75fdf3e528c2bb8a5b0deff6c6de62ed2397ecf0b1e90809c8b7ef1c992f37569397569873d", 0xe1}, {&(0x7f0000001400)="5c62f0c2e15c2e38ca999f44919036000b76da8c49a29d4bfe6a1eb55fa7b47dfb5436e6feaf60dece0baa004f3e374ea164a3d5c55c56cc96a3f8a85862afbf48a8fbd636719e194c9be61eeb7a884ea6c15505c2c1cdeae6b35878af9b", 0x5e}, {&(0x7f0000001480)="3bcb7330445f286a7e2e90bc5e21f1a7bab0f76f9f557f7ffef48d2c63f2dc3a234ded5c9e4393e17b4a425369dfe8f5ae6d2d21eac494b7d1ca2080d310e649bea87eb90c4caae8fa8ab197e2cbd287e861753d00fd622568bbafed89261c1b4665414c15491ec876701de9a4609e403043dc6f2f4151562c4718c19f0ff1f583ce407e04e30490aaadeaed6fb59ecdf79499fd51e103f5f89a9ba9daa022bb7d2cb6a759f9b1af423d18b97966ffb4a4d906ab1a6e20e01478c8da1c5e814fbcc6ef64c4e2ea161e2f39b88231908416c66c39e9960721b42dd84a76c4fe1f652291558233c026b5a00245", 0xec}, {&(0x7f0000001580)="b9fcc5bc95d84e661694f5bc427b6ea8e865370e57d70b1e29040fdfaa60634c278fdbd35fb07f803cbc5f740f7fc58ee638b75ccfb23428fc8edab0b38249f26966f7100c13680a1f869fdece3a3c77bf82672bcf83375037c0071edb2cfd77c694de17193f6db5c8176b5fdb08e6201b5de0b2b83079f38b747923c813f0336fb5110d7cc7d0ffd836bd064b25", 0x8e}, {&(0x7f0000001640)="5c67a568b9161f7ca3d100086721240e2c5ccefaa3a7a73474e6ee3dd7512effa428bf93e8a6e3094b3b4a8711d052d902f29c34a0c5afcc7463badafbd4625db78e8facc9ccc95a2490badaf5751ef7b28c115386bb41c95571bc647028e26f8383335267bccf85f0c04c69ca12507d112eb585caec6c35903ddeaae2ed9cf1a9bea619c4111800b5d9874d787b791fc2f281b0f423098848ba6e865edd5fa15e75da82bf8f4d8ce6bdafb247cd67", 0xaf}, {&(0x7f0000000080)="7cb9257ecacbf43632136241919b", 0xe}, {&(0x7f0000001700)="81aa2cb5a605a48a585688e23914882aed9d6d1d038f38b6ba2714eab391080f5b7968d733f7a727bdfdf98ddacb", 0x2e}], 0x8, 0x0, 0x0, 0x8800}, 0x20000001) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000000000000, 0x9900, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x1f, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x10000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}, 0x4280, 0x0, 0x3, 0x0, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) 04:00:01 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000540)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x0, 0x0) r5 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r6 = socket$kcm(0x29, 0x5, 0x0) r7 = gettid() write$cgroup_pid(r5, &(0x7f0000000500)=r7, 0x12) openat$cgroup_int(r1, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000005c0)=ANY=[@ANYRESOCT=r4], 0x0, 0x17}, 0x20) r9 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r8, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) recvmsg(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000640)=""/149, 0x95}, {&(0x7f0000000200)=""/8, 0x8}], 0x2, &(0x7f0000000700)=""/211, 0xd3}, 0x100) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x89f) write$cgroup_int(r9, 0x0, 0x0) 04:00:01 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000200)='memory.current\x00', 0x2761, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000240)={0x7, 0x70, 0x22, 0x5, 0x9, 0x1f, 0x0, 0x9, 0xc, 0x8, 0x80000000, 0x1, 0x7, 0x1, 0x69, 0x4, 0x0, 0x4, 0x7fff, 0x4, 0x5, 0x9, 0x9, 0x100000001, 0x68b, 0x8, 0x0, 0xffffffffffffb4f4, 0x1f, 0x40, 0x80000001, 0x10, 0x7, 0x4, 0x400, 0x6, 0x7fffffff, 0x400, 0x0, 0xfff, 0x4, @perf_config_ext={0x2, 0x6}, 0xc010, 0x800000000000000, 0xfff, 0xf, 0x20, 0x1, 0x100000001}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x8983, &(0x7f0000000000)={r2}) [ 304.901304][ T9856] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 304.966619][ T24] audit: type=1804 audit(1560830401.622:32): pid=9854 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir673334256/syzkaller.fmkcFH/12/memory.events" dev="sda1" ino=16704 res=1 04:00:01 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r7, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffb4) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) write$cgroup_int(r6, 0x0, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:00:01 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x15, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = getpid() r2 = perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x70, 0x3ff, 0x7, 0x4, 0x8, 0x0, 0x5, 0x48, 0xc, 0x100000001, 0x5, 0x4, 0x29, 0x10000, 0x595180a0, 0x6557817a, 0x4, 0x6, 0x4, 0x6, 0xffffffffffffffff, 0x10000, 0xb409, 0x7, 0xffffffff, 0x128f938c, 0x7fff, 0x9, 0x6, 0x9, 0x10001, 0x200, 0xbe4, 0x2, 0x7f, 0x76f7, 0x4, 0x0, 0x2fc209da, 0x5, @perf_bp={&(0x7f0000000000), 0x8}, 0xb060f5b7e22298b4, 0x64, 0x3f, 0xf, 0x3ff, 0x100000000, 0xa50}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0xf) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000140)={0x5, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x1, 0xd, 0x7, 0x3ff}, &(0x7f00000001c0)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0xfffffffffffeffff}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r1, r2, 0x0, 0xa, &(0x7f00000000c0)='!:*nodev^\x00', r3}, 0x30) 04:00:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000004, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0xffffffffffffff36) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @broadcast}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x40030000000000}, 0x0) socket$kcm(0x29, 0x5, 0x0) 04:00:01 executing program 1: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab1, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x2, 0x0, 0x3, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='cpuacct.usage_all\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000300)={&(0x7f0000000440)=@pppoe={0x18, 0x0, {0x2, @random="1250c8010805", 'batadv0\x00'}}, 0x80, 0x0}, 0x4000040) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) write$cgroup_type(r2, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) socketpair(0x15, 0x3, 0x2, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580), 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') openat$cgroup_ro(r1, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000000)={0x5, 0x70, 0x2, 0xfffffffffffff000, 0x1, 0x2, 0x0, 0x5, 0xf2004, 0x6, 0x80000001, 0xa7c, 0x8, 0x9, 0xfff, 0x7, 0x7f, 0x4, 0xc9, 0x1, 0x6, 0xffffffff, 0x9, 0x6, 0x4, 0xc9, 0x7f, 0xfd09, 0x5, 0x4, 0xfffffffffffffff9, 0x348b, 0x3, 0x7, 0x8001, 0xff, 0x63, 0x94c, 0x0, 0x2, 0x4, @perf_config_ext={0x0, 0x800000000}, 0x100, 0x1, 0x4, 0xd, 0x2, 0x1000, 0x10000}) sendmsg$kcm(r6, 0x0, 0x3fffffffc) socketpair(0x1, 0x1, 0x0, &(0x7f0000000380)) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r8, 0x400454d0, 0x3) r9 = gettid() perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x2, 0x5, 0x0, 0x9, 0x0, 0x159a, 0x200, 0x1, 0x6, 0x80000001, 0x2, 0x3, 0x2, 0x1, 0x200, 0x1, 0x4b5932d8, 0x9, 0xffffffff, 0x1, 0x80, 0x3, 0x1, 0x5, 0x1, 0x5, 0xa6, 0x5, 0x100000001, 0x8, 0x1, 0x2, 0x6, 0x8, 0x0, 0x8001, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x80}, 0x480, 0x1, 0x3, 0x0, 0x20b9, 0x3f, 0x14}, r9, 0x0, r7, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r9, r7, 0x0, 0x19, &(0x7f0000000200)='\\procem0vboxnet1&nodev\x1e\'\x00'}, 0x30) gettid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) sendmsg(r4, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="9ef4687d0d5b890825ebdec388abb5889fabb3bb7395ce716b62a59287b6fbb75bc0cee1af67a7467c3c88bc8074500e5725ac5ad624dabed0c02032ec31f45c9652f2feafaffeec313f81c7dcaa3b36bdd6a88cba1520e9a9ed58d571babe499175", 0x62}], 0x1}, 0x8001) [ 305.286875][ T9870] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 305.362540][ T9870] CPU: 1 PID: 9870 Comm: syz-executor.5 Not tainted 5.2.0-rc2+ #23 [ 305.370523][ T9870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.380598][ T9870] Call Trace: [ 305.383917][ T9870] dump_stack+0x172/0x1f0 [ 305.388281][ T9870] dump_header+0x10f/0xb6c [ 305.392716][ T9870] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 305.398548][ T9870] ? ___ratelimit+0x60/0x595 [ 305.403476][ T9870] ? do_raw_spin_unlock+0x57/0x270 04:00:02 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)={r1}) socket$kcm(0x11, 0x0, 0x300) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x79, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x20000200) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x7, 0x70, 0x3, 0x7, 0xff, 0x0, 0x0, 0x100000001, 0xc000, 0x0, 0x4, 0x1, 0x100000001, 0x1, 0x0, 0x9, 0x7ff, 0x3, 0x3f, 0x0, 0x9, 0x7, 0x4, 0xd, 0x9, 0x0, 0x3f, 0xcf, 0x1, 0x8, 0x1, 0xfffffffffffff231, 0x8, 0xfff, 0x1, 0x9, 0x3, 0x401, 0x0, 0x10000, 0x3, @perf_config_ext={0x36, 0x3ece781f}, 0x4000, 0x2, 0x3, 0x6, 0x8, 0x3f}, r6, 0xd, r4, 0x3) close(r8) socket$kcm(0x29, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r5) [ 305.408622][ T9870] oom_kill_process.cold+0x10/0x15 [ 305.413760][ T9870] out_of_memory+0x79a/0x1280 [ 305.418467][ T9870] ? cgroup_file_notify+0x140/0x1b0 [ 305.423698][ T9870] ? oom_killer_disable+0x280/0x280 [ 305.428923][ T9870] ? cgroup_file_notify+0x140/0x1b0 [ 305.434155][ T9870] mem_cgroup_out_of_memory+0x1ca/0x230 [ 305.439730][ T9870] ? memcg_event_wake+0x230/0x230 [ 305.444793][ T9870] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 305.450636][ T9870] ? cgroup_file_notify+0x140/0x1b0 [ 305.455873][ T9870] memory_max_write+0x169/0x300 [ 305.460759][ T9870] ? mem_cgroup_write+0x360/0x360 [ 305.465802][ T9870] ? lock_acquire+0x16f/0x3f0 [ 305.470505][ T9870] ? kernfs_fop_write+0x227/0x480 [ 305.475556][ T9870] cgroup_file_write+0x241/0x790 [ 305.480520][ T9870] ? mem_cgroup_write+0x360/0x360 [ 305.485586][ T9870] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 305.491260][ T9870] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 305.496922][ T9870] kernfs_fop_write+0x2b8/0x480 [ 305.501805][ T9870] __vfs_write+0x8a/0x110 [ 305.506166][ T9870] ? kernfs_fop_open+0xd80/0xd80 [ 305.511129][ T9870] vfs_write+0x20c/0x580 [ 305.515393][ T9870] ksys_write+0x14f/0x290 [ 305.519738][ T9870] ? __ia32_sys_read+0xb0/0xb0 [ 305.524517][ T9870] ? do_syscall_64+0x26/0x680 [ 305.529217][ T9870] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.535304][ T9870] ? do_syscall_64+0x26/0x680 [ 305.540010][ T9870] __x64_sys_write+0x73/0xb0 [ 305.544624][ T9870] do_syscall_64+0xfd/0x680 [ 305.549152][ T9870] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.555054][ T9870] RIP: 0033:0x4592c9 [ 305.558962][ T9870] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.578713][ T9870] RSP: 002b:00007fe5ddfacc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 305.587145][ T9870] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 305.595136][ T9870] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 305.603121][ T9870] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 305.611110][ T9870] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5ddfad6d4 [ 305.619102][ T9870] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 305.685308][ T9878] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. 04:00:02 executing program 0: socket$kcm(0xa, 0x3, 0x11) r0 = socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r1}, 0x10) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xfffffffffffffe7c, &(0x7f0000000000), 0x1139}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f00000001c0)='nr0\x01\x00') [ 305.970228][ T9878] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 306.141285][ T24] audit: type=1804 audit(1560830402.792:33): pid=9891 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir673334256/syzkaller.fmkcFH/12/memory.events" dev="sda1" ino=16704 res=1 [ 306.196779][ T24] audit: type=1804 audit(1560830402.852:34): pid=9854 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir673334256/syzkaller.fmkcFH/12/memory.events" dev="sda1" ino=16704 res=1 04:00:02 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, 0x0) socketpair(0x0, 0x0, 0xc4e, 0x0) getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x40000b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0xcbaa60f5) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r2, 0x0, 0x0}, 0x10) [ 306.260976][ T24] audit: type=1804 audit(1560830402.852:35): pid=9861 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir673334256/syzkaller.fmkcFH/12/memory.events" dev="sda1" ino=16704 res=1 [ 306.641640][ T9870] memory: usage 4128kB, limit 0kB, failcnt 212938 [ 306.662904][ T9870] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 306.688568][ T9870] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 306.714358][ T9870] Memory cgroup stats for /syz5: cache:0KB rss:2136KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2136KB inactive_file:0KB active_file:0KB unevictable:0KB [ 306.752374][ T9870] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=9857,uid=0 [ 306.789690][ T9870] Memory cgroup out of memory: Killed process 9857 (syz-executor.5) total-vm:72840kB, anon-rss:2148kB, file-rss:34816kB, shmem-rss:0kB [ 306.827481][ T1044] oom_reaper: reaped process 9857 (syz-executor.5), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 04:00:03 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000000)={&(0x7f0000000400)=@nfc_llcp, 0xff79, &(0x7f0000000b40)=[{&(0x7f0000000500)=""/174, 0xae}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000600)=""/228, 0xe4}, {&(0x7f0000000700)=""/93, 0x5d}, {&(0x7f0000000980)=""/221, 0xdd}, {&(0x7f0000000a80)=""/132, 0x84}], 0x6, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0xb91d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r3, 0x1, 0x28, 0x0, 0x32b) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x6) r4 = socket$kcm(0x10, 0xfffffffffffffffc, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000c00)="865e0d55f71e611319da567f88f2727c96e123caba5b6504310628c831704835bcd8c40020812f06149ec6ab25d525842c6a57506a6b8614c6f8e5115e48a3bcfb96ac2646612aba0e2a7947da0d8772302ed652924c4467fd9063a1aa984394a892596a94a1836364986464e410eedfe6243c3c06a71b550af4336096318bd1c7d58d56495f1d5e60eece3c5410760dc11c93c321e93d93fe850e1d49145e433bf3e8f6588da23a4f3ff4166782482d8307fe43e311955ec08b03f125622e4dabc7a44839c0b49d10", 0xc9}], 0x1}, 0x8000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='.\xd6cgroup\x03\x00\x00\x00\x9c2\x00\x00\x00\x7f\xb6\x88\xd1\xdc`\x890\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r5, 0x28, &(0x7f0000001180)}, 0xffffffffffffff1b) r6 = socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f00000004c0)='./file0\x00', r5}, 0x10) close(r5) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @remote}, 0x0, 0x0, 0x1, 0x2}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000780)="912dd6598655681da9bd6fb087f9fc91a6cd2e6f97af17c909174dabaccbaea56cffcca39c2b4dcbb65c4f5d79dc91ed1d34efedb2049534fb0983b123c135cc46928f24e7d497b5abca6195459a8845076e7b2801164d13d88894a442621d48ce0260f3f2da695ca65e6569", 0x6c}], 0x2dd, 0x0, 0x2c2}, 0x20000010) socket$kcm(0x29, 0x1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000900)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000480)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r7 = socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) recvmsg(r6, &(0x7f0000004fc0)={0x0, 0x0, &(0x7f0000004ec0)=[{&(0x7f0000003c80)=""/14, 0xe}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x4}, 0x10040) [ 307.054322][ T9882] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 307.097767][ T9882] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 04:00:04 executing program 0: socket$kcm(0xa, 0x3, 0x11) r0 = socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r1}, 0x10) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xfffffffffffffe7c, &(0x7f0000000000), 0x1139}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f00000001c0)='nr0\x01\x00') 04:00:04 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="180000000000001749bcac0001000000ec00000004"], 0x15}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)) socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) sendmsg$kcm(r1, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[{0x20, 0x1, 0x1, "9f000000000000000b17dc73b602d2a2"}], 0x20}, 0x0) sendmsg$kcm(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x1}, 0x4090) r3 = openat$cgroup_procs(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='pids.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x100) openat$cgroup_ro(r4, &(0x7f00000003c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x30a) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TUNSETLINK(r4, 0x400454cd, 0x138) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r5 = openat$cgroup_ro(r4, &(0x7f00000002c0)='cpuacct.usage_user\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) [ 307.593475][ T9878] syz-executor.4 (9878) used greatest stack depth: 21680 bytes left [ 307.598844][ T9908] IPVS: ftp: loaded support on port[0] = 21 04:00:04 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, 0x0) socketpair(0x0, 0x0, 0xc4e, 0x0) getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x40000b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0xcbaa60f5) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r2, 0x0, 0x0}, 0x10) 04:00:04 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)={r1}) socket$kcm(0x11, 0x0, 0x300) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x79, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x20000200) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x7, 0x70, 0x3, 0x7, 0xff, 0x0, 0x0, 0x100000001, 0xc000, 0x0, 0x4, 0x1, 0x100000001, 0x1, 0x0, 0x9, 0x7ff, 0x3, 0x3f, 0x0, 0x9, 0x7, 0x4, 0xd, 0x9, 0x0, 0x3f, 0xcf, 0x1, 0x8, 0x1, 0xfffffffffffff231, 0x8, 0xfff, 0x1, 0x9, 0x3, 0x401, 0x0, 0x10000, 0x3, @perf_config_ext={0x36, 0x3ece781f}, 0x4000, 0x2, 0x3, 0x6, 0x8, 0x3f}, r6, 0xd, r4, 0x3) close(r8) socket$kcm(0x29, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r5) [ 307.910271][ T9925] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 307.950587][ T9925] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 309.273027][ T9908] chnl_net:caif_netlink_parms(): no params data found [ 309.619958][ T9908] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.629528][ T9908] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.638133][ T9908] device bridge_slave_0 entered promiscuous mode [ 309.647204][ T9908] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.654865][ T9908] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.663762][ T9908] device bridge_slave_1 entered promiscuous mode [ 309.991785][ T9908] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 310.011702][ T9908] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 310.332492][ T9908] team0: Port device team_slave_0 added [ 310.340122][ T9908] team0: Port device team_slave_1 added [ 310.356917][ T21] device bridge_slave_1 left promiscuous mode [ 310.368224][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.423453][ T21] device bridge_slave_0 left promiscuous mode [ 310.429788][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.484505][ T21] device bridge_slave_1 left promiscuous mode [ 310.490780][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.543577][ T21] device bridge_slave_0 left promiscuous mode [ 310.549815][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.425848][ T21] device hsr_slave_1 left promiscuous mode [ 318.488676][ T21] device hsr_slave_0 left promiscuous mode [ 318.537681][ T21] team0 (unregistering): Port device team_slave_1 removed [ 318.561126][ T21] team0 (unregistering): Port device team_slave_0 removed [ 318.589162][ T21] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 318.658980][ T21] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 318.830955][ T21] bond0 (unregistering): Released all slaves [ 319.006098][ T21] device hsr_slave_1 left promiscuous mode [ 319.068265][ T21] device hsr_slave_0 left promiscuous mode [ 319.118526][ T21] team0 (unregistering): Port device team_slave_1 removed [ 319.143143][ T21] team0 (unregistering): Port device team_slave_0 removed [ 319.164111][ T21] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 319.209033][ T21] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 319.387029][ T21] bond0 (unregistering): Released all slaves [ 319.575746][ T9908] device hsr_slave_0 entered promiscuous mode [ 319.632835][ T9908] device hsr_slave_1 entered promiscuous mode [ 319.779116][ T9908] 8021q: adding VLAN 0 to HW filter on device bond0 [ 319.814734][ T8789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 319.829665][ T8789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 319.843988][ T9908] 8021q: adding VLAN 0 to HW filter on device team0 [ 319.864463][ T8789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 319.874154][ T8789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 319.886338][ T8789] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.893482][ T8789] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.011821][ T2952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 320.028471][ T2952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 320.037868][ T2952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 320.053723][ T2952] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.060832][ T2952] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.075795][ T2952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 320.086833][ T2952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 320.112383][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 320.121393][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 320.139776][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 320.151507][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 320.195999][ T2952] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 320.208286][ T2952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 320.235157][ T2952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 320.266827][ T2952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 320.287883][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 320.354701][ T9908] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 320.679383][ T9940] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 320.692705][ T9940] CPU: 0 PID: 9940 Comm: syz-executor.2 Not tainted 5.2.0-rc2+ #23 [ 320.700629][ T9940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.710874][ T9940] Call Trace: [ 320.714513][ T9940] dump_stack+0x172/0x1f0 [ 320.719475][ T9940] dump_header+0x10f/0xb6c [ 320.723910][ T9940] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 320.729739][ T9940] ? ___ratelimit+0x60/0x595 [ 320.734369][ T9940] ? do_raw_spin_unlock+0x57/0x270 [ 320.739517][ T9940] oom_kill_process.cold+0x10/0x15 [ 320.744742][ T9940] out_of_memory+0x79a/0x1280 [ 320.749696][ T9940] ? __sched_text_start+0x8/0x8 [ 320.754741][ T9940] ? oom_killer_disable+0x280/0x280 [ 320.759970][ T9940] mem_cgroup_out_of_memory+0x1ca/0x230 [ 320.765626][ T9940] ? memcg_event_wake+0x230/0x230 [ 320.770673][ T9940] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 320.776588][ T9940] ? cgroup_file_notify+0x140/0x1b0 [ 320.781833][ T9940] memory_max_write+0x169/0x300 [ 320.786719][ T9940] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 320.792208][ T9940] ? mem_cgroup_write+0x360/0x360 [ 320.797258][ T9940] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 320.802741][ T9940] cgroup_file_write+0x241/0x790 [ 320.807713][ T9940] ? mem_cgroup_write+0x360/0x360 [ 320.812856][ T9940] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 320.818520][ T9940] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 320.824180][ T9940] kernfs_fop_write+0x2b8/0x480 [ 320.829066][ T9940] __vfs_write+0x8a/0x110 [ 320.833430][ T9940] ? kernfs_fop_open+0xd80/0xd80 [ 320.838394][ T9940] vfs_write+0x20c/0x580 [ 320.842663][ T9940] ksys_write+0x14f/0x290 [ 320.847017][ T9940] ? __ia32_sys_read+0xb0/0xb0 [ 320.851812][ T9940] ? do_syscall_64+0x26/0x680 [ 320.856511][ T9940] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.862601][ T9940] ? do_syscall_64+0x26/0x680 [ 320.867393][ T9940] __x64_sys_write+0x73/0xb0 [ 320.872275][ T9940] do_syscall_64+0xfd/0x680 [ 320.876809][ T9940] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.883213][ T9940] RIP: 0033:0x4592c9 [ 320.887129][ T9940] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 320.920207][ T9940] RSP: 002b:00007fcfe463fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 320.928815][ T9940] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 320.936805][ T9940] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 320.944896][ T9940] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 320.952884][ T9940] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcfe46406d4 [ 320.960886][ T9940] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 320.975860][ T9940] memory: usage 3076kB, limit 0kB, failcnt 198102 [ 320.982864][ T9940] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 320.990687][ T9940] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 320.998184][ T9940] Memory cgroup stats for /syz2: cache:0KB rss:2152KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2152KB inactive_file:0KB active_file:0KB unevictable:0KB [ 321.020662][ T9940] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=9938,uid=0 [ 321.037321][ T9940] Memory cgroup out of memory: Killed process 9938 (syz-executor.2) total-vm:72712kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB [ 321.055516][ T1044] oom_reaper: reaped process 9938 (syz-executor.2), now anon-rss:0kB, file-rss:34784kB, shmem-rss:0kB 04:00:17 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r7, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffb4) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) write$cgroup_int(r6, 0x0, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:00:17 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="180000000000001749bcac0001000000ec00000004"], 0x15}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)) socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) sendmsg$kcm(r1, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[{0x20, 0x1, 0x1, "9f000000000000000b17dc73b602d2a2"}], 0x20}, 0x0) sendmsg$kcm(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x1}, 0x4090) r3 = openat$cgroup_procs(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='pids.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x100) openat$cgroup_ro(r4, &(0x7f00000003c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x30a) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TUNSETLINK(r4, 0x400454cd, 0x138) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r5 = openat$cgroup_ro(r4, &(0x7f00000002c0)='cpuacct.usage_user\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) 04:00:17 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x84) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000100)={r0, r1}) sendmsg$kcm(r0, &(0x7f0000002700)={&(0x7f0000000140)=@nl=@unspec, 0x80, 0x0}, 0x20008004) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000300)=[{&(0x7f0000000000)="771215fa36ee2c9c2aa383c804644315", 0x10}], 0x1}, 0x0) 04:00:17 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.memory_spread_page\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_int(r1, &(0x7f00000003c0), 0x12) 04:00:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000002b00)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000002980)="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", 0xfb}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000000)={0x7, 0x70, 0x0, 0x43ab, 0x0, 0x0, 0x0, 0xfff, 0x1, 0x9, 0x0, 0x0, 0x6, 0x7704, 0x7, 0x10001, 0x2, 0x101, 0x7b, 0x3, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x2, 0x24, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xb4}, 0x0, 0x0, 0x8001, 0x7, 0x2, 0xfff}) r3 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0xb}, 0x14) recvmsg$kcm(r2, &(0x7f0000002900)={0x0, 0x0, &(0x7f0000003b40)=[{&(0x7f00000014c0)=""/163, 0xa3}, {&(0x7f00000016c0)=""/144, 0x90}, {0x0}, {&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000002880)=""/122, 0x7a}, {&(0x7f0000002b40)=""/4096, 0x1000}, {&(0x7f0000001580)=""/9, 0x9}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 321.332395][ T9908] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 321.366215][ T9944] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.0'. [ 321.393425][ T9908] CPU: 1 PID: 9908 Comm: syz-executor.2 Not tainted 5.2.0-rc2+ #23 [ 321.401374][ T9908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.411564][ T9908] Call Trace: [ 321.414874][ T9908] dump_stack+0x172/0x1f0 [ 321.419224][ T9908] dump_header+0x10f/0xb6c [ 321.423656][ T9908] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 321.429478][ T9908] ? ___ratelimit+0x60/0x595 [ 321.434083][ T9908] ? do_raw_spin_unlock+0x57/0x270 [ 321.439210][ T9908] oom_kill_process.cold+0x10/0x15 [ 321.444347][ T9908] out_of_memory+0x79a/0x1280 [ 321.449059][ T9908] ? lock_downgrade+0x880/0x880 [ 321.454033][ T9908] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.460293][ T9908] ? oom_killer_disable+0x280/0x280 [ 321.465496][ T9908] ? find_held_lock+0x35/0x130 [ 321.470288][ T9908] mem_cgroup_out_of_memory+0x1ca/0x230 [ 321.475857][ T9908] ? memcg_event_wake+0x230/0x230 [ 321.480999][ T9908] ? do_raw_spin_unlock+0x57/0x270 [ 321.486143][ T9908] ? _raw_spin_unlock+0x2d/0x50 [ 321.491011][ T9908] try_charge+0x102c/0x15c0 [ 321.495536][ T9908] ? find_held_lock+0x35/0x130 [ 321.500419][ T9908] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 321.506258][ T9908] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.512537][ T9908] ? kasan_check_read+0x11/0x20 [ 321.517408][ T9908] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 321.522969][ T9908] mem_cgroup_try_charge+0x24d/0x5e0 [ 321.528278][ T9908] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 321.533925][ T9908] wp_page_copy+0x416/0x1770 [ 321.538539][ T9908] ? do_wp_page+0x486/0x1500 [ 321.543146][ T9908] ? pmd_pfn+0x1d0/0x1d0 [ 321.547404][ T9908] ? lock_downgrade+0x880/0x880 [ 321.552265][ T9908] ? swp_swapcount+0x540/0x540 [ 321.557035][ T9908] ? do_raw_spin_unlock+0x57/0x270 [ 321.562155][ T9908] ? kasan_check_read+0x11/0x20 [ 321.567013][ T9908] ? do_raw_spin_unlock+0x57/0x270 [ 321.572208][ T9908] do_wp_page+0x48e/0x1500 [ 321.576637][ T9908] ? finish_mkwrite_fault+0x540/0x540 [ 321.582115][ T9908] __handle_mm_fault+0x22e3/0x3eb0 [ 321.587333][ T9908] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 321.592884][ T9908] ? find_held_lock+0x35/0x130 [ 321.597656][ T9908] ? handle_mm_fault+0x292/0xa90 [ 321.602611][ T9908] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.608868][ T9908] ? kasan_check_read+0x11/0x20 [ 321.613736][ T9908] handle_mm_fault+0x3b7/0xa90 [ 321.618645][ T9908] __do_page_fault+0x5ef/0xda0 [ 321.623438][ T9908] do_page_fault+0x71/0x57d [ 321.628077][ T9908] ? page_fault+0x8/0x30 [ 321.632332][ T9908] page_fault+0x1e/0x30 [ 321.636495][ T9908] RIP: 0033:0x4303a6 [ 321.640402][ T9908] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 46 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 bc 4b 64 00 85 c0 0f 84 [ 321.660013][ T9908] RSP: 002b:00007ffed630e780 EFLAGS: 00010206 [ 321.666089][ T9908] RAX: 0000000000019691 RBX: 0000000000714640 RCX: 0000000000008041 [ 321.674100][ T9908] RDX: 00005555565bb930 RSI: 00005555565c3970 RDI: 0000000000000003 [ 321.682084][ T9908] RBP: 0000000000008041 R08: 0000000000000001 R09: 00005555565ba940 04:00:18 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./csyz1\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.high\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000), 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000000)={'bond0\x00', 0x200}) 04:00:18 executing program 1: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x10, 0x0, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x400000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$cgroup_ro(r3, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000040)=0x1ff, 0x12) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="24000000130081ae08060804000f00002cff0100000060003f01546fabca1b4e7d06a6bd", 0x24}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x7) [ 321.690071][ T9908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000714698 [ 321.698053][ T9908] R13: 0000000000714698 R14: 0000000000000000 R15: 0000000000002710 [ 321.717062][ T9908] memory: usage 748kB, limit 0kB, failcnt 198111 [ 321.730933][ T9951] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.0'. [ 321.770541][ T9908] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 321.796288][ T9908] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 321.891421][ T9908] Memory cgroup stats for /syz2: cache:0KB rss:44KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:44KB inactive_file:0KB active_file:0KB unevictable:0KB [ 321.916738][ T9908] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=9908,uid=0 [ 321.951587][ T9908] Memory cgroup out of memory: Killed process 9908 (syz-executor.2) total-vm:72448kB, anon-rss:72kB, file-rss:34828kB, shmem-rss:0kB [ 321.968043][ T1044] oom_reaper: reaped process 9908 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 324.413617][ T21] device bridge_slave_1 left promiscuous mode [ 324.419907][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.463541][ T21] device bridge_slave_0 left promiscuous mode [ 324.469781][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.135464][ T21] device hsr_slave_1 left promiscuous mode [ 328.198453][ T21] device hsr_slave_0 left promiscuous mode [ 328.257855][ T21] team0 (unregistering): Port device team_slave_1 removed [ 328.279707][ T21] team0 (unregistering): Port device team_slave_0 removed [ 328.301408][ T21] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 328.365913][ T21] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 328.507086][ T21] bond0 (unregistering): Released all slaves 04:01:03 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2c0100, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='dummy0\x00') r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x85', 0x2181004, 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x2, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_type(r6, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000540)={'dummy0\x00', 0x8000}) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, 0x0) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x0) ioctl$TUNSETVNETBE(r5, 0x400454de, 0x0) openat$cgroup_procs(r2, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x5, r2, 0xb) write$cgroup_int(r5, &(0x7f00000000c0), 0x12) 04:01:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x48}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x51100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1}, 0x8, 0x10, &(0x7f0000000040)={0x1}, 0x10}, 0x70) 04:01:03 executing program 4: recvmsg(0xffffffffffffff9c, &(0x7f0000001380)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/228, 0xe4}], 0x2, &(0x7f0000001280)=""/247, 0xf7}, 0x2000) sendmsg$kcm(r0, &(0x7f0000001840)={0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f00000013c0)="05ff1e0525e721e80424f63ef4f914192556648249caf0e9c69aa2f5b505bad36449ee036d4712c06c1aa7a76e8eb228d4332b6f913cc62a18b5ad4b95abe45efad9a43738cc18efe53be811a4ce9417cbcafe508cd6d5fb5ec764ef2ca87c4331dcb13b49cdabf35c74eae49f96e99e10da2b6f36c533ab761ef1ed8e5d12e1b77ee53decccc6b42bc4db4f9016fe4263ca9b01b1b1a4f40c7b0a504a86f8fcebcbe225553a2f590670ea1cc923d3b29ef9b8d268405c2b9cb463e5b9ea2956dca9706786b1a2bf60fce7a75bce111536ecf9c45957024390c872b7efda0427d0547e7a", 0xe4}, {&(0x7f00000014c0)="13d2e7672ccd65dda698a595222115a4a82576a40b0fc55cef855a6517c07e4aac45fbca3620d9607906ea33fd20a05bcd4fd4c4d076e274e315222d576c3cff4a3a5a7c18f356a9bcd3f3731f20d07fa2d6c20caef157be71dfb41b7f863cc19d6f217b2ce23a5dd2ff55090520c32fe02e874302cb54e19362768f697a28d61362f5e5434c3c10fe94b2a954f0ece7cbf410eaab6dda1c9c7ca0ca660a9526578295c57d0cc5a5a21f63fc277dad773085f3f448dc8ff67b1256f29e0e3522c0f8ccd3a39ef906f9ed", 0xca}, {&(0x7f00000018c0)="c1b02ae18ac1de198dadb9bf56c1a34d6369de270f9a3872c52f1273ec9d1cca473005811e2db1258540aec69c2d9faf801d88ec87258af13f9d9176d081f596a01ba413fcf70a8d1793eb7c5be078f73560ece3bd55a6", 0x57}, {&(0x7f0000001640)="967fe881afd83f6f7a657d890265922c9a71345961ef1ce9e55f3dfc833e5b37d7cf504775c3cf38a526dee8e2d30fbee78346342a2d803d1dbfaba6375343efdba285527c1259b18e250d84f3", 0x4d}], 0x4, &(0x7f0000001700)=[{0x110, 0x3e, 0x20, "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"}, {0x17, 0x11, 0x3, "c9f53c1970c28329"}], 0xffc9}, 0x40801) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001880)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r1) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e01980ecdb4ca904010065160b00010010000000020000140e0006001500cd6ddc2976d153b4", 0x2e}], 0x1}, 0x0) 04:01:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x30}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000006340)={&(0x7f00000050c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000062c0)=[{&(0x7f0000005140)=""/163, 0xa3}, {&(0x7f0000005200)=""/4096, 0x1000}, {&(0x7f0000006200)=""/155, 0x9b}], 0x3, &(0x7f0000006300)=""/1, 0x1}, 0x100) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000006380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000006440)={0x1e, 0x9, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x25}, [@alu={0x7, 0x3b, 0xb, 0x8, 0x4, 0xfffffffffffffff0}, @map={0x18, 0x0, 0x1, 0x0, r0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x90c1, 0x0, 0x0, 0x0, 0x10000}, @call={0x85, 0x0, 0x0, 0x27}]}, &(0x7f00000001c0)='GPL\x00', 0x9, 0x26, &(0x7f0000000200)=""/38, 0x41f00, 0x1, [], r1, 0xe, r2, 0x8, &(0x7f00000063c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000006400)={0x4, 0x2, 0x6, 0x5}, 0x10}, 0x70) close(r0) 04:01:03 executing program 1: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x10, 0x0, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x400000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$cgroup_ro(r3, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000040)=0x1ff, 0x12) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="24000000130081ae08060804000f00002cff0100000060003f01546fabca1b4e7d06a6bd", 0x24}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x7) 04:01:03 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffb4) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:03 executing program 0: getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x8, 0x209e20, 0x8000000001}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x167) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x80000001, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) perf_event_open(&(0x7f00000017c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x4, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) [ 367.260348][ T9975] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 04:01:04 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) getpid() socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000010008108040f80ecd34cb92e0a480e180f000000e8bd6efb120009000e001a00400000ff052005001204", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000001900)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="a12eeb591c35bd4ba25eaef0e3a44c073b9519e910f72322105f823f1e343bf2d3d3240244dfdc82f541f47d159aef69e7274f29878b51431dfe74ea7e6bd30ee14a825102a1bdfe4417696148bfcd7d4e5aadc97180dda4599ed38fdbe2c0f137f779e48015c6ae1fc792bc43a508d12a3fbe1f2f0e4e34dcff804403918a4965df45327657416a707e2bef385a4418f8806234f8ba3df5b30982d44a67fc81d72805a2fede8a18775d07e7f1ad42156e33fd4d7f7fe6503685df56606fb3678240b4f8643af82b3dc2", 0xca}, {&(0x7f0000000200)="0514fff87a33615585a3608dbd8c4005dfedcd194b4eb047e0520f8d4290826cb670cd0d3c684cc020cef89f00f30e7461017920528133b06d2d2b2e32bf07946cc5cfda20aa87088fddb4a3b3405031ae55b5c9c3790b158975d6c6bc594c7604e6913766b25e2bfc614f73ad3055f37d659e2dffeeff2b414a5969944361b69486360dce3027d16e9839bf980964efa9e19f841f6bf0140c42c4ab209d45d74d069ff230b410079384a8c53d3bce36d20a6f91053962b4c37905db5f8a610995b9af4cec15f2b94288f692402c85818627f4990c4bdc6c12bc85405fab4f0d11b1568d9ea58b30f7442a964aed1be8b27c076bb6", 0xf5}, {&(0x7f0000000300)="8c9ee8d7edaea48c598285fcbcc58b382923bc6602a34686a052d5067af8cb2639c881d4aca8d6b2ff25e985ee58e5760e8396c80a5086196a4a5d7cca1a280d93864b2f1d4a01a87524b0e24c6af631b3d741a6258f86d853b2c145ae4ff3981bbd60a6cf277ea90109b2e85714b821d3bdcd7fde8649ca39fbec6f373b5bedc47047338c478e3aec1882b5aee83ca1ee48732ca25b065fb05f2865f9274c5c8fba3b986e89ec083bb11d349d087ce8372f52232d60bc79133fda731733f9f0e31679eab9bb5169253bf196e12ec0ee060697034f4909ccdda39bf9cf3d17937740cd0dfba275444f04764e47d6bc5c49b71623", 0xf4}], 0x3, &(0x7f0000001a00)=ANY=[@ANYBLOB="b800000000000000110000000000010064f1280630c0f084a64629d65e2242c07ae75731b23617a2e86442ee3be27a94943b92f2dca0cbb94a5668aff086642e7b8a5681f33dae81fc128b9157c30027fbf4cff241345c80b890791799a7f4e4bdd10e73aa715bdca6f19645ce3029de15034e09858ced53aa3b7910a4783b7b4a1e320f2d5e97ce22fe36075c9973e24a101061f2003a070929d784fb7bbcbd1048269bbcf03b6638d436e298a9ce1976a5ecaaf0000000f00000000000000018010000050000003a435defd8bebb9b5ef07ae0aea91e055e0ef60f7c7ad6c160a4774025765ef5513389261a0faececec469f185e15a0238606f2c47b0009e5314b0692af60f862cb10066165f911e25ee8895b937eac99e0d6236c159c6d4396cf41802178aba249f6ba12df73c02cb5f15ac808c8b219c489bda72b83b48efc6efd47a34a87d6b7027d467177363c7bf5257a1441c0242e96edb35a68e04ef050e9bb816c14f072bbd45e1ebdaf4b163eb6fbf8e0b2645dcbbab80b3ff04f4e0d962b6217df854e64517a7949025dec25925334436dd41bc4ff7c708c22d8481541100000000900000000000000000000000ff0000005d4a9783d343ff918f0108ec2d9228433114ec49853f2d134c810fbf9c3573824425e6c5e89703194a999be92c175768bda510d9d2f566caf1c22c8dd495c6440fbd4d13ae7b806423669866156ea9499be6517a18d9c182484aac8c12884e10b0fe7b79a99077539e4167496ef00368cccf4223269d352022f9f10000000000101000000000000001010000ff030000fc076ed09d89245d7e61623ebcf6f7db417a9128334ceb247c8519eb8bc0be1291c820bd397d2376dc5bc3673e0d9a2e5ea066ba590d82cabcd95c06d854151fdeb7b8f56b1de64c12abca7858aa14461db14ee6c0c313dd32e917a6dc451c51f104f88de921d80983355bde2918c1d424ca9a0cbd46a679ba4670ae8193dfa2aedf7e9219fe7a47a2ccd7dd0328fdebdda68573bfd9fba03d999e0ebbdee0ca0d5d3d2b97120ea6baff7097d0223ef83b7c54c6e4b91c3c44b5008cc70e10da51003ed30d3c9e3588c67f16c676eb3377fb21e077e18db02a9985021f26b0fa726b5062c15178bc78c0353038c3892ac0538ee29f57222dab9fc6bd4a23d1d0bb3b7e30ef01ae0a6d3e337e8b530583aaf259a159c4a4330b4c2f27a7ad7bd83543b3f29760949b241ad82d9cf4ebb52218f4d1be9f948308fb81b1f0d3c7d119283f731c8fcedc909112c8fbf1572ca998db57600d4ade891576298e042ba1d13f4d97829b35cc187bd9dd96b1bf51fa6f6f68b4bd89ef7de6fd1a3180ba05f1260d847b987c4c08be3576bc1c4bf564fee7aa4f5edf6521977d3bc973e78cf603ec622f6a5aafa0418d7fe81d94024806b22370afb9a336dfde32f0f556822f19be1115dc8024fe713a81e0d9662c58bc1d487d629d35b1e611169a99b9eac506fd29cda473b6f35cae724ca465de0ebeed60225e87eb3fbce61cf5205a8d440aed29cccb6e79966844d7961d18379aadfeaabec496744e7dfb81923acf85e7cd58f2086f324d7da73281a1c0873d5a7e8e5f7ea9e8e2acd51953a746856209c1595c1b2c8f97ebd4cbc4d41771fcf23b2131a5ac264caf6aa525a8073d5333186979e0846ac93feb54332085df6c1c636781e46dbfb1513166649e54c451191a2da9e5d734664b404d3b28cbae18a557e16691fd62392564c50ecad23c2aac1cf353c736abf211eb0fd5e5ddb9053d45eaad2543478d99b7e86ac4046f860640939b4549b83dd892be084bb1ca7b4dca267b58bc553a6b6f20bb15bf7c140cd64e3646f8aa400188c3153e988597914b7abc03c945b04f926a69502c6f733b4be98472300441ebaf54b63f3418960a99d0d1e2e808b32f96f40ce6a7f76938d9800be65cfa1f3bcd94c2f77d6d478109aed0d395205de702aa52a752baf9a9abe050b1f66560a3e1055116307145b597a3f8b33d593b37b29215e7a6e72d38706c113253b7948be3e93179ad8be7458db9c33e85b876156e13fbe19c5d14b0cf55ffe17809e4cc295f0359890ae6690eeceb487a5a3d61cdf23d0fef9dc741e5cbfdf660daf3ca372dc0ff22fee6c3887453611114340887159ed9117f8b448bdd6d485b105f0873957e1c835569f576a84759cf393623d6acef8805b6bca25a4ea113d4085ef9a1e6ddd860b5e013f4819e95265dcbd77ec48d8826247c9a7eadaa265d78e6f1dd115387e52eb779ee6f5a332cd43b21cae244ac96b648b0c8aae6ad630c07246917d5e54cd44f265521fe6e8492ab054de42f5cb168334d7f337c74464c13b99574f6f60d30c8b8960b02af38e2a51d89fefb7171beb550a2c06fc422b7efa47b8a2832ffde81da361b2bd5c9c8061187647b6b483373b59e7fc13271d2351e48efb5bc68dab8933f2fd4a9ca5bb5b9e57d0649dfeb13a7c36a0817d81146112c91c75481ec8f03621670aa1dac895d705cd6c83c7532fe2c0255d8ccda53205cbb3623b97d9beeac0dc1db070d62916ed833d3e0d46f83221f8e1e8e3585777012d5ba371e5c1383c0e09f760d2dc3beafb1af148b61fd064848d440196eb7e754aa6b422b62c1852bd3ee6dea129dda48d557f66b35f80c8ab4a3ec6aaccddfd22df677110412d64302a2039e787745242c946161e126748c68f618c49334c96223c7e148fa7ec83b3645baf69ba624ffc52365806c14a21b7e33b37acd5471403e2f8a08c84f2074a357cdd5e685998771d02a69165b5b420287cfe803d4a6495cf9d98fb47c646e525752ceba38c89a970776628364738fe1cb0e2afe97be369337bb25a1aa4bbc1e45711449f8a342786d3baf24006f7449c462b1376c46a1d5845324bbbfb7f040da9042f0c233589cd281cd2d6b44abef3ae4ecd98bf07232bdddc73e7d6f0d680979cb975269ae21c558ff5f42de81b7407969d864f07faed3adfa4eea7159a95ae97521f6cc852ebbeacd70ed9ff2732efecdf28533586459ad5f61aba154e384dd228d837ace5a33ad33b35e617857d7aa6297195d22fd8d494275d5a713218e53e49c12f856eb49ec5de3782b736294bea0e879b87786aa521df95a83fd4eab07ef9b9736b6edd5e6d2b890f907220664d5fa4f9d6e6cbea4798f6b7c59b1861a7bed51b8d5a50d620cdd34afe0e398a3668850acbf91a4373f1b1a6f763e1aadb4488896baa805f57175446bba8140fd60b9c483cc75784bbd895a1b9b49128c68c3bed1c20d1eb7c6d9593e7922b1adc66139b2e81405ac3a616d9a1854b9959aa5bf08f7bc11a8f16f01e77825411abfddc4e33003a3b1e702c2594e2bd4ec03c748c1c747ea49dff97bedc73175353d957db102a9e73885bc1cfb60ce7b3b605f615d672c452d1de283cb307372b96299fe95508992510946371f4117cde4d82556c80ed11218ab407b1eefe762a7c19b8466a2c12d754e1f69a4fe61d07fd13ec2c18ecf7c15871605e538a13b15b4bd7a6964ac64e6eae48fd4fca925a5dc4c3f74ca03ce20859f04f8e44fca4badafb7b4dc9c87565c8aa670e6269d8f3f0dac4f72e2f724a453be35eeaaf2947b08bac9d4e9320dbdc096b80e124e16e3e6524cf59d9fe26118e59d1d2319fb903c69082dbce6ae6c433dc791d1758067fe2ad44af08a682f9ed5fc7be463e4943164f59c2e77374a9bbabe06be965564b881065c9d0700d6e77236a2138d85246f0eea974b9b0e049fb16b2da1c2b825ffc9d54ed52ab566f001c8ea9bb26714ec50d48f240a0c6c9a52913339ec3d51b403adb715e191b14c25b8d7819037bc3c15d677e27e0d6796b1d5c849d1d7c8b76709955eabfbe53cbe5c172d609e7256721b26e77ddb7632b859c8bc7e5ea3373849c49759989a4945072bd353883cf6aa6171584d10955b47171973a3aee8c0a80d9f2589e43ad5b619d27ae53e78b9c524d51c34151efed7bb8399b1e22f123f70b6aad004c64eb99ddb157723113284c1b9b3421971cd953e4ea43d94e9e1f53eae3b1ef28ca0f21eaa2a75dc08b7abe965ee27ca834a0e4b3b9691172d1dc81e9da123e8ac8e06753f47bbf70e283c4e7cd5e8fddc31030e80b49ff649e341d0f7b50262e85ddd2a8edf4e88195fb2b1e953816516d38b1a1da4314c0cd4f54790a1cdfb7b6e82cab77554ab1b159833b05ac6c99473a574e4ab6e94fe05fedc1d612b5e06e28379063e7e0e6c46696ab37c9731b702381f2a9368c0fed4b4d9486b159abefafee8cc3a75e0f7a1cd88d356e863ded269871ff9b82cad93beb9338371f950107a36ff7c1b65496c274bcfcd9ad803a379b57ba3fab67d3a7b53f45132bc2c24e30f5cbfaf669faa7ca31c1b91bae85622b64601ba547050a64fc487d4c8b976c57a8e18f0eb44a095d1db35927b7d3210d84448b9b4eab4071dcc5d13cb1e417ffcf62e2a0c20e7e69d08d0afe1a8434715878e5e9ede617431eb1cb74a16c1ce21319aaf2f32b2eb6e8cdd646fa525256ffc045fb6864433fca274bcb103ebd007fe8189c67e71ca927507d81797362c88894dcab8649c1cf5d1efac9db107aa4787713193040cef9528b9702ffdb74eb11ac9f6a40d361bb73fde31fd22b9cb23bbdcfa7dad4ea843fd52778135108c3122b978c694fb4e849db5e799af048a4008b0307569c269359bb190d88f02e54280d054e41db176bca97ac98015c20090e2db426c0def56a13a722ca8efe47eaccbda1d529ed8f4403a75b32c032e5d4e8a9a89f74a1ab218a712986923008ddfed31c6d8abecae35f76419cc50344ce3532987316eafd9dc39017231caf5fd0396a7115a1f5f579d47d8d4753062e0222bffb26fd162222de52d352917ab001cc56e2f981027f19aaaabd0f00f9844d09971e1676d312d99eac93f40fb12370c9d8f99b6e3468f683499f085a69dab6bd04445d9e0a0eb98cabaed89ceb4152bfc26677a7745dde74b2a1b598ddbe2dd9068511004c0e8050bc14348d1add3e8c7ec290751a29638e5ca4df3efb7db43a6766593dc2d2effde647e7c0d54786eeb77442f7a679f8797c61097bb137bec80ffdfc12a861c293840ac81824de12a244b9c4041c1c89e0c500deba3edcd4be740ba14f36b60c79722d992fe6cb57d4742c6368b09d3e59c180be87a9e368d5b08961045d2377d02923d1d70cae9c7874ee0056ce903ce2e6bbd9e55ae0459c2450eb1049b0273b8d893bdcb53192723e65322c078b1e7b5b9f5ee9fdc258e35b6597339a6f9cccf3c264e23207188185326cb1c744ffaf6fe955d827a0f2d3bc79cba9dcae39838e37b98c8edb333fa2ee2233b55d2d6b48104034a9cd646c5ab559a2d63b46ac5af9ac17fb34bdee1f01ed75438bc8a79c7724733a2b4d16a50b3a8781b350c40bde1e52a1b406491712fc930f82200ee8b013083b79bffe01d0b483b6afdc74008f60e4e0ac495b577a3edf7453e5b086a3ece3a4d709c071ec9498fe905c5f084d142fb2f1fef0460074f1042effe7c7fbc889688acbe2d77b82ff9f43f6e972df19beb60e0b65eafedb3c1bc8fe0f8cb1252df705bcca2c9bbedf4c28a3e405b14ac83d35bcf34df97ac89f8dc3ce96c0496eb29a1a3c2acdd9d3d729059f94d2219ee2dbb13c0fc8f045fe7dbf031e90877827003c5b2a085947bf65188fb692f60537f7da5d54c21bb19f4682a700c59abfba910de32ac9db4865d83b704eaaa1cae4ab99cb4f44466c21efd5e1595a0aa59c383e450c2588c0982d1a753b8086e596baf5260040796ee088369a530438782d68710a9d64b0f6a1b90edbadb14d0e599e297254897828d185148f25c6184e930e755fe0787a7addf4a491c4bb2107c0d36388930261aec2522ea903e78c0f9d773c66569f3e37d3e41cd63fbfbc9dc0ef6983671a73297987cd735a8c4adae674c60b53d70173adee6c721a44c95a0c19b7f183f09fcaebd61978e4e46b79a501f4310eff48b17eac0745fc2fe0203a0a6e8e688e268a710582d7105369db725ba171c570cd4d79764dd836f0679416c378b1392a5f17e7fc47ff4b908850f57d940eae3fd26571c68200204c924fe14d133c486ce5d2c38453870fad94af8d4d9ef520e677d0cbbebcc9a3ce4c4cacb4b9c38768e7501587cc8a5e9168ae86898ea19fdbea461d2a1e6774b9b47e55bc128bb4c21c90c75360a813e8bfa86653cf1456fbfdf5f6dbbdfa7437be2c5e5418216f88c1de137340fc8461ddedce06969c4118f93e6b231dea0893cd99f36213162a87123a3dc3a3c0438943323dc9f3e3059652c7f80780ed6b541b9e29c9460bcdf2cb613b773fd02d7592b685d7839ee32607387e2115ea29de18899e6b483511c5f9041e7b93f23a3183e04cd06e83df31b4b948ab05fd4609eb8dc5de67ff05a63a022fd98dc19c7090bce9066785ca995c1e6ea9c39da54ce809ab409bd05da09658b596a270d1f8290871e3459528c079ab44ea0b893e0a2240bd0bd913f869314c777b4e899ebe113c764e7ac1db5a3b46734ce90fe3cbd0b0a6b53e17732d54a6909660e6e373bb9d799c9fd11c8a5ccc5b58508010000000000000201000009000000f6301adb8eaa2757949c88e1a4e3e29f98ac993677a4ba195f8b9eaae85eb210bd7d19fdec5162833fa490d3c8a7ba8ad793ecf9a679644ae5db83a49e3f6d8df90c6e3511186210341f4dc447fbeddd521941b0a0439ec8fb095f01d847a8c25639e470f0941849e8d3c4fc74be089f139095208a195a7fa58d96fcbb430ed44c38efe528a38148954507d14f74d9bdb5991f104f8949f89256382045ac772e9901f62a62a8851b52195ecb2e5715a04c5320c0ffdb78ad37fc140da771dfa8b9158b099e55f5889e1cc30bcb1c29ea0244bd30cbed31cb04f1f7b6ea5ec9c52f8cbb1cf5d46b59a390e2af8a8930d2d5303a5a0000000020000000000000001601000009000000f402ea001691cacbd987b9d9c3fc386cc00000000000000003010000e1ffffffa20405ee60cfae3ad4905d0142ef5751d61a14ab40da7ab6a793a3e655e94c9d3c6235349a4876d7f85df86fdd83e58871d5090ada31b3fcb9ebcea3ccf80a53af0112a9887e04d5df3722e8d553670f19e83be142b06cd4e6cdcb232172b9d324ac633396ef6b4785b438fcc4555fb739c0bad85b823f2db1646e65a0b158fed7ffea6de4d5969de14f32c7c2864cd0ec81a07ebee66561f9757d0d730628b933a2f7b1e3da67bdac000000000000005000000000000000110000000500000018dbae5a1c9bd4601f934eb5c9e93dd59f68b19c194565e5df2d64c94a930efcc54751d6256ec54ea207920d46ae72107c64934636adde96c6b4c3000000000060000000000000000a01000002000000547607b046186b921a9a7ce70809294968a8f805d1db884a1e018bb5cb6ad50ded64dd89f791cfd2ed930fe2247ffe2152ad8bf1fdad4c645784d8f53acefe985a3f7cc422aef4f2c11363b156ee0000"], 0x14e0}, 0x4000001) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001980)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r1}, 0x10) 04:01:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x200000000000018d, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x1b}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 04:01:04 executing program 0: getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x8, 0x209e20, 0x8000000001}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x167) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x80000001, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) perf_event_open(&(0x7f00000017c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x4, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 04:01:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x3e}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000340)="aa98c836bfa2c42574dd51e39d7f", 0x0, 0x2}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000005500)={&(0x7f0000001ec0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000005380)=[{&(0x7f0000004000)=""/4096, 0x1000}, {&(0x7f0000005000)=""/158, 0x9e}, {&(0x7f00000050c0)=""/241, 0xf1}, {&(0x7f00000051c0)=""/196, 0xc4}, {&(0x7f0000001f40)=""/57, 0x39}, {&(0x7f00000052c0)=""/143, 0x8f}, {&(0x7f0000001f80)=""/49, 0x31}], 0x7, &(0x7f0000005400)=""/202, 0xca}, 0x40000000) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000005540)='rdma.current\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000005600)={0xf, 0x7, &(0x7f0000000080)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x18}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7}, @jmp={0x5, 0x100, 0x7, 0x0, 0xf, 0xfffffffffffffff8}], &(0x7f00000000c0)='syzkaller\x00', 0x2, 0x95, &(0x7f0000000240)=""/149, 0x41f00, 0x0, [], r2, 0xe, r3, 0x8, &(0x7f0000005580)={0x8, 0x5}, 0x8, 0x10, &(0x7f00000055c0)={0x3, 0x6, 0x0, 0x5}, 0x10}, 0x70) 04:01:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x3b, 0x0, 0xc) openat$cgroup_subtree(r0, &(0x7f0000000300)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400e10001, 0x0) close(r1) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000340)=0x4) [ 368.035312][ T9970] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 368.860189][T10008] IPVS: ftp: loaded support on port[0] = 21 [ 369.034327][T10008] chnl_net:caif_netlink_parms(): no params data found [ 369.061877][T10008] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.069188][T10008] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.077307][T10008] device bridge_slave_0 entered promiscuous mode [ 369.085800][T10008] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.093084][T10008] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.100965][T10008] device bridge_slave_1 entered promiscuous mode [ 369.108776][ T8844] device bridge_slave_1 left promiscuous mode [ 369.115785][ T8844] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.163985][ T8844] device bridge_slave_0 left promiscuous mode [ 369.170278][ T8844] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.755737][ T8844] device hsr_slave_1 left promiscuous mode [ 370.825830][ T8844] device hsr_slave_0 left promiscuous mode [ 370.885972][ T8844] team0 (unregistering): Port device team_slave_1 removed [ 370.899386][ T8844] team0 (unregistering): Port device team_slave_0 removed [ 370.911169][ T8844] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 370.949087][ T8844] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 371.048730][ T8844] bond0 (unregistering): Released all slaves [ 371.168417][T10008] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 371.181003][T10008] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 371.189226][T10011] IPVS: ftp: loaded support on port[0] = 21 [ 371.208889][T10008] team0: Port device team_slave_0 added [ 371.219090][T10008] team0: Port device team_slave_1 added [ 371.294351][T10008] device hsr_slave_0 entered promiscuous mode [ 371.332792][T10008] device hsr_slave_1 entered promiscuous mode [ 371.545578][T10011] chnl_net:caif_netlink_parms(): no params data found [ 371.609379][T10008] 8021q: adding VLAN 0 to HW filter on device bond0 [ 371.618801][T10011] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.626441][T10011] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.636167][T10011] device bridge_slave_0 entered promiscuous mode [ 371.645160][T10011] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.653982][T10011] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.662161][T10011] device bridge_slave_1 entered promiscuous mode [ 371.698548][T10011] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 371.710374][T10011] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 371.737682][T10011] team0: Port device team_slave_0 added [ 371.750691][ T9385] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 371.769998][ T9385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 371.778676][ T9385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 371.796695][T10008] 8021q: adding VLAN 0 to HW filter on device team0 [ 371.810842][T10011] team0: Port device team_slave_1 added [ 371.834557][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 371.849233][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 371.859395][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.866556][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 371.908269][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 371.924531][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 371.940238][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 371.950544][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.957830][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 371.973713][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 371.988920][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 371.998254][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 372.085463][T10011] device hsr_slave_0 entered promiscuous mode [ 372.172868][T10011] device hsr_slave_1 entered promiscuous mode [ 372.235465][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 372.249557][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 372.258846][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 372.280221][T10008] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 372.298484][T10008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 372.320584][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 372.330519][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 372.381268][T10008] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 372.438903][T10011] 8021q: adding VLAN 0 to HW filter on device bond0 [ 372.466061][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 372.480152][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 372.493235][T10011] 8021q: adding VLAN 0 to HW filter on device team0 [ 372.550024][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 372.559367][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 372.575458][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 372.582740][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 372.599305][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 372.608523][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 372.617521][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 372.624712][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 372.633692][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 372.643713][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 372.662543][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 372.670731][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 372.684714][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 372.695515][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 372.704533][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 372.719385][T10011] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 372.731032][T10011] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 372.746774][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 372.755283][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 372.764161][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 372.776326][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 372.785512][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 372.794845][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 372.861554][T10011] 8021q: adding VLAN 0 to HW filter on device batadv0 04:01:09 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000002c0)={&(0x7f0000000340)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f0000000680)=[{&(0x7f00000003c0)=""/197, 0xc5}, {&(0x7f0000001380)=""/4096, 0x1000}, {&(0x7f0000000240)=""/20, 0x14}, {&(0x7f00000004c0)=""/149, 0x95}, {&(0x7f0000000580)=""/232, 0xe8}], 0x5, &(0x7f0000000700)=""/73, 0x49}, 0x40012020) sendmsg$kcm(r0, &(0x7f0000000b80)={&(0x7f0000000780)=@ll={0x11, 0x15, r1, 0x1, 0x800, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000800)="0758745a8079b801931877913e747ff72c6a08d36926a10e660690def45d9d8acd87d7c9049e23f1d0047ff18627f1d7be9f3d22329101383ad9d722cb1ef507be8a39f5f1a223dbafeb42ee38046e1fd43785c4d68783cc751e986000f873785a2eb95d8e3d8341", 0x68}, {&(0x7f0000002380)="30af07f97e8e46765ec0655fad52db9058638a715b16b672b86993e1a883090f758e33b4e609e6ae2d3114e9c3c536583f13d9fdaf9592c64222a90049a71664e471be9328d50a338a7ffacc01b36562d3314aa527c65901a1a384a414e976caf8ec2ccba41ad1f1f6b5a0b654ea73625349bff6429de33a6553aaf22dbeb0dff33360fecaff03162b1d6e6b5a2722cc0568b10ab459521ac23b3246717642604c20f6b86930aacf40f7c40b4b7945078896b50bde7e48c70455b80fba4694826d57e8bc01cf3aabea9d1b50fdd41c83c8e0c259196986e1948aff458f940c90d8289bfa1e15e4d081afb3463ad313a60c6662a670fedc1d81bfcc72b42fbb00bf120d561d4666773e3accce5bf53593d07a6d619ca92c9c7a1d90a68d1271a62ad55d2a3258d8a2502410dcc49aa90235fe5c8ec231a70cceb914e90188cb518c1e0124cf98e48114cb44480ed68a4a86d901ce2e878e027a3f7aea77a4dfac9b19147afcd0fe37a32136c85ea51860f493a6216dddb95ef6a7ad0bf099cfb6995da03346eb497757ab471cf0839fec22d0620802dccba9531feba3bacbce681a7ae2c1b6ec074ef4480fe38053224260e41ccac45cc5a34d08d3302c2994d4994e85d259823d5c85e5ebe977a28bfb52b63cbda031aa1df230b4ecc135c1bc73a12340706c7d76fde8035882a5dcdab35fde040177893e50fb68b4d9534aa5e481e65ad2da06af86a761dbd8bbc099f41caf9723a41d2f7bdc5ebd9e5f752719f76c441f3be74fcf0b1ec8e066ea937148cb65e8bc91ce94f247ec8bafdd983b3a6c7c62f9b66ce3563de15f20202b5184917a7ffd514210524e868e12c1bbfa8dd2805d74fdedc2df9e273d53343810258b6f91b343b6a13603de4c68b58dee27478d2b538ce6900b9071d127f10ec9735a4fc8d8b18b9a01ac91c306e7845de1648bde0d0f56294debec571f2ea19a65200a8810eda8f178ec23cdf71e1b2f8db0c1e4964ebb58eebf281ba08ce81e5944c8703dbca2af2fd818a727817f2fb3b407bca347d53a609b0f14e302c62524acd79ac28740b1302e74cec40629faaa174835ac46ca361507b42e1f5ad33b9a8cc4d81aa20b053fb61b216d3e2ef0ddd9b1665e5007cd972d5b92bae33e07dc5185aea61d7cd9cf50ad5cedf7c2bc0d42e97acc8c137e483882bf9e56eafe9de0dd7b3e17382bafc8f1111a21e03d5fdbaec0e5748f7ddd20a97cc4a6923568ef6f298911780a52852c3aaef95e0e6e50bdc86a5694dab212c778f66bea8c4bb60abed2605b9fa5f592fa9c787d2dcb9729e7ac59c657df49ba674e516e5e5eb092126d0f8995a338639136ccc9bbaedf1ddb864891ca27414bc9e55712afd5ae1d9e9df5456306fab0c1eb562545be8c8bb3b9b4134df74bc89b4713a45092bbb7e3884c9bf5260456dbe24c1d4008e663c4a1107b88c013afc8f107670d1774dca5fb4f94d2094633ddc3f4f421c16ce646157727f0f0292ebead6990e52d9a79e3117c43378283ee91537657df2b1cc2f22b1c1a64dc27d35339c8ab219b114460040bdd0fe6fc12d50a443b6be5f8b3b782ee9ddf8d8aa1acd2b415fcedf6fe53dd15f06cdb9bbe09f2ebbf8aa1ac0fab11d8e183291b669324416ba7d9d338795938ea87229e9d77558ea624f8c81903753e43b1dc8655b21ac8ca02bf45172639ee6a18a665d8cd290a4cfb31df0d07105ad16934cb75b6c66edcef461e70d01f3ceac7cd068eb47e73463af763d9712b838550f377ccd7b3f920989f0e546364454f15f9880fcf83cc7086b41d9ac4f2de76e9e1135b750983e78261126e73b24902f475e4e1a6e60c36f4bed85873f3b7a883923261d369ab124e668adc2303b72757c808d1553f2c98439a34571c2ae7b7a4d39197d294199c7c8b03b784796bcd4a9351f6985962c35639e347f0a7ce41f2169a2b3130dd80d5f8aad1cd5a8df3dc96a9ac0fea00a5f2d69f5d5da4e4e28799372d79ed30f39bdc275ab5c88db1b0d4d677548ae7fd78eac34e05066db632c0a55e3ccd3f8d4404d543581aad6af37acd9770d3fb0629dd6d05fc9bc96b47394fe29c73bb3fb4eaa0099619886524ef600623af247d4a3f03e6da27b3179cd9947e841f68ff91f00121acd186232a46857169503027eb30c9f501bd2b9d2e5eb4f05e21f22acf37472f07d47c741a2144a49242d33e95617eedf4bc43132a36c1adc7fdf9bc0ca3db77f668381aae7e42f34d2a8ff1d0daf13e96d816051ea391a41868e47c2bff5118df69c5dcdda8296c791fb15aa463eec75895f5f48e5e421ae79fc170daca1689423f3ca14a394a78ef2525ff4141def1e645827ee406c46759787be5d38d4f826ed9e71c640a87c980f0450f1eb89e1a86d2e2f18ed8a82ab11c360998892e235310e47d9d2fd27b688008ab723cb78dc546b88cf77e1c7a6924e9f8f320dcc1e2128c3547e3f859d4873345e161fa4b1a6ffb0c8e3f55f42b641acc561e787d4012113a393b770bd412c68df859090496eb1537ffb09b388c311a32e63148f02ff027434394368119686ded5bae444e3f62a6e5a9e696fa6a011ec284b3d14f0c30a60be030c4752b3a4333b36f7d4ca27aee890d264a19a6464a2890de2f55a3dc272cffa7b26128e5d96b31489a160abee0aebdf0049f76fc0633bbb6d1627aa298e96a7240e801f4d6b52eb2238a7cf9e7c0347d9b1ee29a387365cc1e01f49e6cd946ecd719a78611bf7f08e46cac56918bf0f6a15a5d998cc19b216f2293f29f2d85e0ce408414df8c427cd11ecb2151d794385b04ac4600dea31c0d85e7533a9523a02b2b646ac9dcce937e3965c7f513ce7e107147047ace2109bcaf13a820abe165b7a97f126293b6196c7d83aec944fadf99b4d914a00a92cd9d621f445508b1cd480b0b873744105336448bf85b6f7d9376d3f5d5a822d8fcb7db68c8c7cad40aecb9aa8f7e6902889aac76c04843e475ae4895943ad524b491291e289d18d09398b36ad76e36595ad43112ce79568ab39811821a10a9a27877a1ea8632facf029596e1493b9b953aa4c61ebeb5c2202b2007e6fab1e3580a2a1af2b514963e7671e848728b084e570ab4d90ba48a7cd891f0828b033cbfd120c4d672326e3419631b790ef430248ae9c8b889e62e8bc7fab6df4585b9575905135e08c39c10deb04a2ad145421f810ef4ca69d11e9be70785a4e0509d691e15ed134de45a1e564790628c149986bf234281f69aaf83898f69c6b51bfb1de53dbf8d682b6674cd5b0134e2bf1247495b62a8d8d14d87cd47b230f5802b65ec151957182da35375ec4a5a281a8a84d247d24b63d4560a2afe171ec55cd4887a05dabf88fb827e5c81835b5b21322f2eb9281433609dc96ccb24e4840a5467a14a03213a11bceac135b279f0086c57e7c6b704906cdbe066fdff97000cc04f678ab0f7c5c996f2e4a04c422a2e6452d556cc94e13f21bc8890172f939a1ce77eacad910137a3322f39b9d55cf7348559e72a82b721f05f38b8d9187f42afe7f6ed646a507350a1cbaffbabb6fbb36c7ae3820d46c8f719abfc93e56245aa0e3d8202933643170b7201ae0bb59fcfa54e8bc243a4d9d450c0b0a52aee4eb0bbf6e2b73521231f8f52c9137da5425e77ee0408e1de3fbf9ecfd1074735c0622f55cf43b6e36ef4eeb2f9ac1dfad14ebee3267be14c2bfc2163e7344fd5f63b9340825b7a6c0eb5bbc1d47d2a805813eef4f7898888cdf66117105a97fb66b300cc90d96c6a3c116b1278d7ac1cc91aa89ee6d6fc7daa8e4f60942b872113e1680fc32e7fcb5b40e5cd1fa78f16690e48e91300703f08ae0ca12d36e07cff5218e4ff75f532f910b5543bfaef9dc9f376bbb0be7b0a57c257ca41bbd4e6059aacfdfbd1b1b4b2f1f3f4cf9923531bd8ea8bbc0c222013937cc2d395f65c9953be9694d63821dc066e8a944405716a940219f25c0e38c1c0ef9d63843a0ff25fa0c512623476130deeb4db29b31e1f733ba4bf9a401c50afe68a08a859035f99b87d016210a57b509d4f1afbd98d78e0e43e4a9aac87020adbf5379d8c6d973a6dd4d139c9c6a64a5269f449c1636f7dfbb6830451141b923e4b2a9a33457b75f82bb485f1b3ee41c3bc19453d560eadfd5b2f39b13db7c3dfb2c4a8cc2d472f07bdb83dee2a20fd043cabef53a1ab97b4b0e10e915422656be4e53d6cecebf1894dc4d2896bc1860a8d25889101af2f81d20c14a855d0c37c8179207ff9f13195c0bfd1f98dc741838d7cbaabdc525d8273b4ff621d909357f0f4679a30136b3f743cb4d1ecb706771d0e15bf24c0ec29156329b77843998fffa2c3d79f8d5213aec6835e45dcf3f0295638e0324477b888f0951956677245a68ef3a8f6ce076a28092aebb46df17b9686b45f54b7cc149b000fa9d89d94fb9ae2ff5e1f38871e6740ddd1ef9f0e7cdda443532c3d3c89f89614dea29bf70a030e1f370f142a74dd6eb8267534abe4085fa83f75a3f363fc34966430738d1195c3617bfeb93e03cd9ee51d2031a576d85fe1a39d7b06132d399a891a264261eb71fac54add3fd7360c5c7aa009de263f610fbec5ffd9e680d64c5a5662239e1be8bc84f8b5affc11ab787ee4673bd5f458263d491499cf7b97bb4fa31b17a217b803dcbebdbb6d45a234cbbd5e76607697847d033f5b545275adf3da9bc3a7a453ee92bf77d9d0298a585bb188f8eecafa9261a193040dc46d418eb50833bd31e42a1ee6ccf175b459a149cb475a671440b147c4ceb99327342b4afe47e9b34e2b7c10f8a87562a972383086df0b1f90dfe771c9b33aa010c34f1592b08fabe061df53458cde029b5acb8af2af89abe62cc23d57834fce3378afd476251a35edb0b9ab9f0f5c71655f453bdf8111dc2c919deff3de9d7c4d674b6d1f2a0d9bae75ec4f3ad8e8dae4670261306479ac5534325e34c8d8f55b3b5e719633482951d99454393af7059b06c800499725dfb860261393a5b20b2c4b5db635a846ee9a9d255385791b5788b885e570a01f534e070ca48856726b4f543488ed22c95a45b4047068f5c8a91925fe19b561a551cc2de5f041eef8abdc3d32ad2c74047a68eb7a8b52d228c5cc9566ce55f78bc13aeb900771444f642ab3bcbeda5e9e4a5b7bdae25a2f0d2ecfdb06180204bf06c264eba1d1e4d28ac6d32ab073206e0bc253b687fe1bc7e967942195f186a0b80118421297bd4466f2317421f165f53039dad5b90c5eed78d75e63634268a1b0bba1100d626b24f77174081dd9747cabbe2befbc277afc05bd2a393b0c2da7eb40f2c8188c7761e171f946a4fc276f7cbb746c42735e3db6641461d3a541185089f91909f82d9ef439326af973d6a9bba31adb24cdd2a880aa12687de8db1e1f4d7b40c2cf8b8c499023429f0cb2010bc448cc5782c72da977abcfd592cb4908bb5572c96f42dc497f6580557bd800c03a89b2dda6f0ea0a5655bb1614674af9d38e28c3a0eca2a45c88e509ea6c99a37a3dc74fc42cb295075e7e791c51bf15e2dff9de21b68460a37dcfe0b3c6ac645ab0f6aa18aab4fb141e2fdb386c0e390554b4581a03298b56a922d79d2544d19c2c3729df8832f8c0937a3f684ccc0a70eb219987c5f114ad03a862ab2b1cefdc38b208b5d7cecd6aa9a58ffde4930d8aa59db970611b0dc80d40cceb9bd9874c1f450ea46a79fd3b3c83385485d255a97eb2c3c5c22d712e13e9d8f9bf76060142a5b919549e03547e6e497a84b3d54c4009ce026a4f", 0x1000}, {&(0x7f0000000880)="7f88a7f576cd9439ca7b9bb76670b093847203855e573ff7a7011f5abd89e4d51c6608dbf59ae250a9ac046747784f4865caeca1b8b821609c468358fc1655b30bf1bf5b55e497f8e2ad3cbc432b5de16e55aa0ac0e7aa87e250a5379701ea3be76c9ce6ab04c9e74f62d4e95f9d86a2968441591779923fa137991155913946cc5b503de676247fdf072a43c8f621bc7878ce28e77ebc2d33a86e2eed5cac7c52559e079727864bcd7cc995f3c1f0b31cab676b32de54c7d983ec886294a0945a18af6bf05560412c9bd4374a82a2eaa232528b53daa08f32ddcce9d06b2eaf5e759d49b50c2f7f37be22b33a04cf92772b409a7032", 0xf6}, {&(0x7f0000000980)="07243d4c10785d9c47bdf72f71013cfc3149ff700d2121318bb64ee0b6bf5d5257f2fd99d76af637809a73021accab391a5f5d11219d45a9c2a7202b7f94fc5aa2daa35c81aab941d9a1965c5bd3fc84", 0x50}, {&(0x7f0000000a00)="d9a729be31f3ccdd7aa260d7bbb139c905d44e9f817a08ac15843077de6417d3e00fadb9117938e5ee67593c", 0x2c}, {&(0x7f0000000a40)="b133df0207f7115d411a5102441d4728831cace6f55de0c29a37ba054d4380f3cde8257e07c662e468cc61bc847df8d420c3f5bb2bf56fa65d1c79067f2aef334df6973ebf94cf7113cf8c8f4a72f22da18476b2cf709385bda4f6a91599479ffdc3a12bc5c23f58975cf007d7b91166ffe290fea9efc6c2695426f75119bf8313c7e80878f522565c8a4c6a5a1906dff20bb7b91dec9a2c5104b9179ef56c93650d391a", 0xa4}], 0x6, &(0x7f0000003380)=ANY=[@ANYBLOB="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"], 0x12f8}, 0x10) r2 = socket$kcm(0xa, 0x2, 0x11) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001340)={0xffffffffffffffff, 0x0, 0xd, 0x0, &(0x7f0000000300)="2aee089f3d0c29bded9f2a906e", 0x0}, 0x28) setsockopt$sock_attach_bpf(r2, 0x29, 0x30, &(0x7f0000000280), 0x706) recvmsg$kcm(r0, &(0x7f0000000f40)={&(0x7f0000000040)=@tipc=@id, 0x80, &(0x7f0000000e00)=[{&(0x7f00000000c0)=""/158, 0x9e}, {&(0x7f0000000bc0)=""/199, 0xc7}, {&(0x7f0000000180)=""/174, 0xae}, {&(0x7f0000000cc0)=""/17, 0x11}, {&(0x7f0000000d00)=""/230, 0xe6}], 0x5, &(0x7f0000000e80)=""/175, 0xaf}, 0x100) 04:01:09 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)="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", 0xcfa}], 0x1}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, r0, 0x0, 0x5, &(0x7f0000000380)='syz0\x00', 0xffffffffffffffff}, 0x30) write$cgroup_pid(r3, &(0x7f0000000400)=r4, 0x12) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup(r5, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000080)) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) openat$tun(0xffffffffffffff9c, 0x0, 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'yam0\x00'}) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) ioctl$TUNSETOFFLOAD(r7, 0x400454d0, 0x0) 04:01:09 executing program 4: socket$kcm(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="1b000000580081aee4056c00040000fe078bffff12000000f000c3", 0x1b}], 0x1}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f0000001780)='syz0\x00', 0x1ff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = gettid() gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000001700)={0x0, 0x70, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92, 0x2, 0x84, 0x0, 0x8, 0x7, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0x9, 0x4, 0x0, 0x0, 0xd7b, 0x7f, 0x5, 0x0, 0x0, 0x4, 0x400, 0x9, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x5, 0x9, 0xd, 0x1, 0x35f84159, 0xf18}, r3, 0x1, 0xffffffffffffffff, 0x0) gettid() socketpair(0x5, 0x0, 0xffffffffffff8001, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) 04:01:09 executing program 3: socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) socket$kcm(0x10, 0x400800000000000, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r0, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1e2}, 0x22) recvmsg(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f01001800008000020000d0000000e800"/26], 0x0, 0x1a}, 0x20) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) sendmsg(r1, &(0x7f0000000140)={&(0x7f0000000200)=@isdn={0x22, 0x1f, 0xffffffff, 0x400, 0x4}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000006c0)="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", 0x1000}], 0x1}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={0x0, 0x0, 0xfffffffffffffffd}, 0xfffffffffffffe27) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) 04:01:09 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='\x00', r0}, 0x10) socketpair(0x200000000000f, 0x100000000000003, 0x2, &(0x7f00000000c0)) 04:01:09 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffb4) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 373.103417][T10038] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. [ 373.118005][T10041] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.4'. [ 373.140809][T10037] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 373.254374][T10052] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.4'. 04:01:09 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='\x00', r0}, 0x10) socketpair(0x200000000000f, 0x100000000000003, 0x2, &(0x7f00000000c0)) 04:01:09 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000880)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6o\x9b\x99M\xf8\x87\x1a\xf1\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+\xdb-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\x00v\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x3, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xffff}}, &(0x7f0000000180)='GPL\x00', 0x100, 0x4f, &(0x7f00000001c0)=""/79, 0x41f00, 0x3, [], 0x0, 0xb, 0xffffffffffffff9c, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0x4, 0x10000, 0x9}, 0x10}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000100)='/dev/net/tun\x00', r3}, 0x10) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'nr0\x01\x00', 0xc402}) r4 = perf_event_open(&(0x7f0000000080)={0x7, 0x70, 0x3df3, 0x7, 0x100000000, 0xff, 0x0, 0x5, 0x40000, 0x4, 0xfffffffffffffc00, 0x2, 0x1, 0xfd, 0x6, 0x1, 0xcf76, 0x7, 0x8001, 0x1f, 0xfffffffffffffffb, 0x3, 0x96, 0x7, 0x6, 0x5, 0x3, 0x6, 0x40000000, 0x6, 0x5, 0x9, 0x4d86, 0x4d5, 0x400, 0x9, 0x3, 0x1, 0x0, 0x7b4, 0x0, @perf_config_ext={0x7fff, 0xb7bc}, 0x40, 0x6, 0x0, 0x0, 0x0, 0x3, 0x7}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0xf31) 04:01:10 executing program 4: socket$kcm(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="1b000000580081aee4056c00040000fe078bffff12000000f000c3", 0x1b}], 0x1}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f0000001780)='syz0\x00', 0x1ff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = gettid() gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000001700)={0x0, 0x70, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92, 0x2, 0x84, 0x0, 0x8, 0x7, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0x9, 0x4, 0x0, 0x0, 0xd7b, 0x7f, 0x5, 0x0, 0x0, 0x4, 0x400, 0x9, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x5, 0x9, 0xd, 0x1, 0x35f84159, 0xf18}, r3, 0x1, 0xffffffffffffffff, 0x0) gettid() socketpair(0x5, 0x0, 0xffffffffffff8001, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) 04:01:10 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffb4) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 373.602083][T10074] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.4'. [ 373.617474][T10044] device nr0 entered promiscuous mode 04:01:10 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='\x00', r0}, 0x10) socketpair(0x200000000000f, 0x100000000000003, 0x2, &(0x7f00000000c0)) 04:01:10 executing program 3: socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) socket$kcm(0x10, 0x400800000000000, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r0, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1e2}, 0x22) recvmsg(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f01001800008000020000d0000000e800"/26], 0x0, 0x1a}, 0x20) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) sendmsg(r1, &(0x7f0000000140)={&(0x7f0000000200)=@isdn={0x22, 0x1f, 0xffffffff, 0x400, 0x4}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000006c0)="5ea03f6db511aee466448c41d0a37c5d52fbf6d123b2238bc0dc67ffb8a030dd7d9264060255082b5024d1bd6e117d7a20ca56078066e91049b134eb2db929be3f0ac2f70eacf24ae891471c290affb67848907db14e21832c3df1d097ecf14e120ecc990d234042832cc0352f4c22b3828a9ad20ee214973a95bd34110513eb0b903c83d4b8aa755076804cf502013c1bbace98bc821e5a8ba782e18f8fa11b088b70db05e454dd159d018ed06d197dd6014565077d4ebfb8b7db6d35f609ed05ffbcf3380687357f1a593b6f2842e76ff1df4bd5ae29584f89e9d2e50ccbb2964e2e6d3487a509a21e1f6c0ab2dcd9f70777a5c1d58dbf37d5ad66d553898b5620b1e35eb2a96ec010bb87957b6193071706744e312fff95abe536818207e41f7af43e08cca42680fadb739d70aafbeafa7fae70e4526c97e9edcac5648e4c38e10efd34d9f09592c73542bf127a1e68cf8fc3e58e78142b5e5fbbee0175350ab1a8aeedc6c8072ccaa476da314b578854756bb2db47caff231a7f64c51d1d7b4ed1e7cde59355285ef2c2be4ca6f0f6d01dc2d9845505f3a97a57f240c0b0f18fb4936dbb6cf7b6dbf6ec28e61a91ae6e748d0adec1c02c7a39019853b7497e5c3fdd571058f3e648b9f14080442b7279b28de971b6c8b97f1cea66a08bf83bee0707cae6972648a7f3924d63fd69ed03a13aaeba0d9e3bb239544359153fa124e70f873f9d10c07a5a0b58e82536153849350203d848998d61cbaa4f67dc73c84dbcd45939a3f01839e0897a3271118e304694db3ab806e05d206bd3c42dc79be167c9c297559d9a85d5eb04369c534360045b1a80e28d1466705873e3d8bfa73c44d59473df58b8a0305e6a5ec7300183cc60115288e393ca5d160a0fc8eaec5a77c0ba0798eed1e18890e2403ee8d156514eb6f5dc075d4a1f7ce70ae6fab8c82c6ecbcf3e973bc6a461f2f739f9820d66e28f3e9834a7ac8ed81a352c9f7a0882b14b2044ededaf694eba063ad3192f4dbf6ba79288a47ccbf6546c4fbbaefc864694e7063e39cb12ec68dca7b20986c48ae94022cdcb888222ee7f05f55ddea71f0298223b3c4109c15dd7ec41e78aef8dd5ff55c89ce7900261d62b35d12b813b8a385863f3c9d1f4ed37d7cd5314226afdb2892ddaeb1eec542cc8c040fc64cd3ae4dcd7264d68d247acbb353e40a33d5682ce2a4a005a2975908cbd0526beb6048840f3499cfcebba06eaf0c51c8b760593098a3def21b3664e7d42253f8c990538d382bf0768cdc106fac3699bcb5b12279f81dc9ba6ed1e2f7820f6cf8a2b3e4c88a33d9f0a32f60673b5897cadbbe7dffb9cf7f6b5a5d62701eba230fb2daa966a63d91e86c02472bd8114e5ba5df8152067086c142e6cd88289a501fc3353c1d0f17a663b179c446220d970d50a9c9adbb0b990be52ad19cd36669df47ff6e1f6fec4b7b1693c802d736aebe985e0c3c59c753ed95d79a7564880c4e2ffe5c9e59e818d2810468c48a4e75f15f3f252f2d780dd30717fe572c5d55adf090223fb30216c3882e9be19cb627aab1fdad81f8f117a90c2e7874edf1c4dc8e2da674348855659434eaba5c5063a29c28f4d22ce5515464b53967ab33d82f0e5afa98322c31e789be5d7600c726bd467d3be3eb4e0df733b91eecd95a5d1648ef268c43906b187ab24bb83bc80fa2ba4ab21d99c0aadf87d15cec51bf2cd52412ec638b43c27551f039e58026e6e910c7f327afe2e363491cfed5caadc8ca674659004f24991fdf76faac054dff64fb2282fc92d3b9ae32222833f1ae905dfa1dada3116765ef2b04ae6124f44cc7f83bd8f159eaa5290cc9e691fa77bec9c35a625b1b24cde8c9363b37b6f77ce844ea77752891b4c837c7c9648f7a16da6aadaf8912ba392c9984d26977c4b99e5c94925f0c6b9a48f2701eeb477aa0a99adb7fd145cd01b3cee9ad3c835690cda9ee1302fdf301558bb1979e177f18876b3fbe7b01597260a33822a63cdc760edee9839d75e0de20acdc8ae98a008d7390e4bb095650149b1bae84d240bd6480fbb10c1930f3a61dbfc3cb17888e33fb12f2dec1523380699b28300bf8b377e4357d5385176a35edbbb6e81e17e42fb07964452b53a069704f597cab1c646a8e8b99c0411e18def7e1c26e7cab72369228dfeb0d306cd46cdd9299538c89697c1c681d577290c2b03c9d84cd1b5803ff9291a28f3efbc3112b53e5cea348d364a954ac78db91e610df86be53c20707401d70f7768cdf0566420c1dfb7216877784244b5a84abc61e577b11b5dfd194018dbaa4024b57e6b0dcba72f621f62938f7a717c9a899aaa78b595f01c48f94c0bbf68c7cfb16c59269f48611dc9d7077b6805edbe30f2c7988a18f5ef3928a769f011936af9cb4665f48ce17afa1bb3f614e76b40a7e0920b9942362c41589f2be923530a186693a429a8e2767ec30d02407d4fbb6a397f52ec48fdb3fc0d2863f301585a14941cfac093cf8e53e91762db548306961979d396e4645f5698aa36db22603d1893149ba2d7aaa44bb14e0eceafd84cddb3c5c3e2a8eeb02a96e9d9f08db989b450614b0767314e4024114c785c95272226f1c2e2a29a07c7c133abaf254fb9d64a1c597ca32c3a1b17bf262907d9a5a468d37986a300f9a1274718521d76cc1fa8ae122f5dc46ba1c998c3d66bbfdece070f37ac35c7d7de0bffc8369f222fe768273edb69115f94177e9ab237ba50eafdefd5a2369059be377db15661961961c3bc60e6b1af713bd20d70b315025a249d5a6d67e340582404b561ae11fcc711c21c80a56d0a6b964d333e0c1a53333a2ebf4ebda28a59680639c0fd282d64539143b2d416accb7b5cfa16fb2dd9b767f79fe9c26f2b70972b2225ae8beae908dfcb34bbe30870369ea766479db570787a6e11d7544f32888b637e3cbbc4fc85e34d7847e26779e8a8d940ae28de2f2d122c1dba8948af913b2ba890cb12cf2db92ae75aac53614d6faaed47b4373147c6c93880646ee35d85394d25d9dadf73ea35ada21cdbc89038e90e9a28949fd84bac77ea7b2f79ece1c3c2defe5faf9b001ac4750920fc6414569413fd2cdb4e49751fa9c1a531d0081856aa2a9f884040610f9782eeb2c135afc0f60c09e1d5c3a83311010ead8b7bebe91bf339b7d88fab261596465fbbb8942fd32aac8661bb3ad21696895365e258f2a6d4e9049f93545e971fc053317082a2c6ebe65e571b29cdcbca06e5f422c6ea288f98d282ad5c9475a3e9258b4a21360d19cb91c99aeb6476f21049c8d6c9918a9ba7ced60b1f97b9b9cacef6958da3fb8b762f35043539c145956487110ccd420783f3c4490cecb089179c99a89e07fc14d2a8e8a78cc1cbbf0caaf9f8a6850fa8f150c45b616c102a09b995ac9408fdfd26b79339ad175691cc065f7911d99c53b249f03a96b3df1cca6f9dfd2d3c1e732681d58cc2fc671010e7bd98c006ba63b703266aa2f1c3d6fbc148902e425d83d044f014b9e7b3977b8fda094e02dd6dd8298983d5d891d66db077233fc155dad208bfe7c6585bdc6d246bba81cacff55994ee88f9163b27f51d6ae47d0b296124d3018f69f79528797e8aaf21d8035c044821137b0f7e7b3b41b8019379002ae9bc70dc1bc377b6fc0e2a40accf480ae0dc53e61a91d1815ea796fc14d6abddcee1fd965adc3a441333d430568bcb29f0cac078b70a4f6d1011c1822708fb1bbeeaea6433cf5cdcf9aec7bbce4c92e6fdda88b3dc48a4d42f4348a05fee23c41869ca326d39c0605d9144f82bd0c3c2f9ac9ae0b1f5fabe0ab5af39babf027a83df5b1c58513d27cb5babc9a5be073043543bff731da9bb715e57678507baf194fec9efa3235631b9594682dd531c3762432e25c25c048e600cc7c318e82b720db17436fbc054c04f59923ae61ec0b4896d08daab3b617bd8d239c24e95c8fcd1a7dd64a8a3d7e158c626833a2735c9e96514639f007983da3bb43a6f18e40d3eda0cc9468d118d28c6bda3ebae6c3ae2c14b1b02305abd16b7c6be707ffaf59142988eb931275bd4c38aefefbbaa95e16d7551f5f1fcfa9744a357d21c76b28747e5e94683d455530433876d509793ed409847f8a972450285f9e9f2dc665e78c7747418523bb51ef8191231e989ca93ef75e9ca27f38a2e5327d29c265c39f12fb1d01a723a902292c6bc06fdc6856d4829680909db55c4650449d0a2d2dad92cfbc8c03fdcb5656a56fded95b0ac41595a2a5bb34d5feb4e06da8adb5143eef67cdc3d18edd095c086d99cb43cddbbfeeb0beadadc1e30ec57bf760592e6365ffacbd6134b7262966af9c808f980fff81280566c79d3a2a15654c597aa050dda7ace4b5298f512b445023d4d86bc37c85ee1a2d7637f3ea0eafd6440893f43a2a912735d0dc8e2827148893f7554897fcb91a4f5581d793fa707fa181dcf69e3fddf498a19767922f4c52fd6797bfba85a61f9c5fe10970b06c7006d7b804f5d1db40b6f606f532cc5a6b93be6473bcbad8f06ead3995cb5f42ee8ddc658ac9085d0c6046b07be03837d5d68504c04b2a769db69e04aa1e414eec40118856f58ac5d3765e5d5038b20d2966389d0b462dfd71065140bf8ae0bb6eb105ac8160c8cc7641b14aaf0304731ab4d9d4bef89d62dd137d7f88645f941999e2fbfbd171a445c2702a87adcb5fd7d7e36d53b715e6ee87fcebdd0b9fef00182fa8e7ec8e7b5a3ac9d332ce92334a8e1ce0d493cff3c2a4fe1f902da785deb68bf936eabfe59a2f698b2d8d0dbd11c25f413ad4b7c554ed5d9e69a1c44c0dd523b47fc66e474357bd6b1e49fc2e12e30e206347d479ce0c20ef4b12e5d63de14e4b7550772a1ef0b5327d755aef1766da85e429a7920e4652d772619ea3526b330778ad35966c12e45a85ce6a5e3e99372a8c621e17ac2c3ff024c625a5599d41ad794e99ceeecb0bf334fd56b823e5b9406c6089fa406aaabe75afd7413affdc1019729d6f72a4b1a330412c03d9f75dbedb88bf556ee57a642fd1802e35807878f7aa15af0a00bc8fa8a4d01ff3e60249d07e780244d387cc60d7f25869f50580f0136391faec535332727b7ec85b12e3be7d8f34369f00b888133c3ad0ffa24bd03c5183d55172076b989b4151227467b915ab6e8347e15c99f2f9051d6ae0b2b72a717536899473b7c04160cc8d6d23a3f0ee63ae0ae4f79523af48779d836f0e0ae4b92ee78b820a9f6319ab064d11b7fb3e91579528a91c7c2521332ffaceb00ebaded7ef22d0ff9986273759b08b9f75565fe5c194bbfe704eda0fc0662db8cc3002b05dc39792540278a2c12501680ef4b95b3eac0573e559c6cf0badbe364e3bcaa14661afe1320a32d4e9644fdcd44b9dce2fee476e8f840a91a66cd877d3e5bbb5b595e654580955f4ba8548b41220a355a805669de9f3bc50157e594f5b444b88a320d80522e51bce929200d71e10e4a85c3d12ee133dda3fcdf7a454773a0575f7d9bfcb8c8646ffbad451446daf3ea742c0fa6bbb2ca4db442e60492ac9e131037278fa5552c0ed00c84469cd11600d3365617f57af4178fc264500327c48ae67de27c62766f9d6848e57f2ce0eb75e1cf72bafb21541c0370f73fc77e0d8b0b11056362a3936e38271259377d40fbc257d8c72b3e583fc6b0e20420dbc99a7932cb305fa9e61bd0de0d9758d35fe0ee13d0eaa782a3059e10caa61df3903aa1061298aced4712d998181e7edd03a11041de4018fe56cae17e0dced027ab7a0a27a6415d8d", 0x1000}], 0x1}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={0x0, 0x0, 0xfffffffffffffffd}, 0xfffffffffffffe27) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) 04:01:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x4, 0x0, 0x0) 04:01:10 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffb4) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:10 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000540)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x80, 0x0, 0x0, 0x0, 0xc0}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000009c0)='./cgroup.cpu/syz\xf0\xda\x0f5\x1cUc\xd9\xef\x17\x95\xbe\xb7\xa3\xff\x97w\xf7DV\x15~\x03\x02>5=94\xf9\x91U\x03\xf4\xc3\xda\xf1/\xe4\x9f\xfe\x90\x1e{\x8e\x81\v\x95h\xabA\xea\xbe\x81\xfa.\xb6Jk\xa0\xeb\x108\x12c\x8c\xf2T\xd0\xcf\x9d\x02\xe0\'\xdb\x80m\x9bV\'\xf9I&\x1b\xde6\xfc\xc3\x8d\x9f\x9b\x9c\x10\xdc\x81Og\x1f\xd7`\x7f\x8c\xd5\xa0V\xc9((\x87\xba\xafq\x9f\\e\x03\x15c\xa5\x13#@\x8d\xff^\x18\x1f\"\x11\x81\xd4\x14\x03\xd1\xe5\xaa\"\xfc\x14QK\x13cLJh\xca\xb0,\xa3\xdd\x7fz\x97\xe5\xa0\xe1\xcdb}Lp\x85\xc4\x12?ZS/\x84\x84@w\xde\x81\x9d\fe\xab\x80#\xa1]R\x17>\xa1\xf5\xf6\x8bTwb\x86\xbd\x8c\x18\xe9rn}@fS\x0f\xa8\xde\xf1\xb3\x7f68\xd0[Rt\xcf \x85\xcag3\xc0W\xa9v\xa9\xb1j=C\xc6\x95uVW', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000800)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpu\xed\xe1?\xd1W\xfe\xf7\xf1#accc\xb5\xbaz\xa4\xf0\xcf-@\x91c\xdax\xa8\t\x9buE\x81\x81\xaa\x1d\xf1\xa94B/F\x85D!\xa4\x85f\x96\xf9\xe7\xe7\x01m-\xee43`\x85\xc1/N\xf0\x7f]\x9d|*\xea7+\xfc\x15\xe1\xa8\xb0\x8deK\xf3\xb2!\xee\xc92P\x91', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x649}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r1, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x7fff, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x6, 0x2}, 0x0, 0x0, &(0x7f0000000240)={0x5, 0x9, 0x9, 0x80}, &(0x7f0000000280)=0xe1, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7ff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=r2, 0x4) r3 = socket$kcm(0xa, 0x5, 0x0) socket$kcm(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8936, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0xffffffffffffff6f) 04:01:10 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000140)='syz0\x00', 0x1ff) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x95541, 0x35}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) [ 373.968081][T10090] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 374.338673][T10038] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. 04:01:11 executing program 0: r0 = socket$kcm(0xa, 0x8, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, 0x0, 0x1023c) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) r2 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x386, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x9) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}}, 0xffffffffffffff7e, 0x0}, 0x0) socket$kcm(0xa, 0x5, 0x0) r4 = openat$cgroup_ro(r3, 0x0, 0x0, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0xfffffffffffffffd, 0x0, 0x0, 0x922, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x900000000, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0xee, 0x7, 0x0, 0xd0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x62) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000340), 0x3c4) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r5) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) 04:01:11 executing program 5: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x1ffbfd, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001600)="2e000000130081c5e4050cecdb4cb9040a485e432600000000fffffff08ef9000600b0ebb06ac40006001400f9ff", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x0, 0x10) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:01:11 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x132d, 0x10}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f00000000c0)="1ed391350702f0f84b063d9f2c2e33012ae5cb", &(0x7f0000000200)="c6167e22bf4e84e49817275c832a652606b994022c4653f488432f91aca32d3f5c9cc60861bb84a123714aaf5d9121212c05ca9938f56b35d5e91aca914b95dae38f43779991e5729d6105a4252b592f49645f5ca082855918806e313f126e92654f495aa404ade8249638473a0fa482e8810bf6a1781520adab2b0de05a91bebf1536cf3da99a9b44", 0x5}, 0x20) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="2e00000027000500d25a80648c63940d0124fc000c00044002000000053582c137153e370300000000f01700d1bd", 0x2e}], 0x1}, 0x0) 04:01:11 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000140)='syz0\x00', 0x1ff) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x95541, 0x35}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 04:01:11 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) setsockopt$sock_attach_bpf(r0, 0x1, 0x3c, &(0x7f00000007c0), 0x4) [ 374.538230][T10114] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 374.572436][T10114] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 04:01:11 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x9, 0x80000, 0x6, &(0x7f0000000b80)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000002d00)={&(0x7f0000002600)=@hci, 0x80, &(0x7f0000002c80)=[{&(0x7f0000002680)=""/159, 0x9f}, {&(0x7f0000002740)=""/203, 0xcb}, {&(0x7f0000002840)=""/194, 0xc2}, {&(0x7f0000002940)=""/239, 0xef}, {&(0x7f0000002a40)=""/50, 0x32}, {&(0x7f0000002a80)=""/130, 0x82}, {&(0x7f0000002b40)}, {&(0x7f0000002b80)=""/195, 0xc3}], 0x8}, 0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) r2 = getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = perf_event_open(&(0x7f0000000580)={0x5, 0x70, 0x1ff, 0x7, 0x93d, 0x0, 0x0, 0x325, 0x402, 0x8, 0x56, 0x2, 0x10000, 0x6, 0x1f, 0x7, 0x81, 0x58, 0x5e, 0xeee, 0x8000, 0x9, 0x5, 0xd7, 0x81, 0x3, 0x2, 0x4, 0x4, 0x4, 0x3e, 0x9, 0x4, 0x7, 0xffffffffffffff90, 0x2, 0x550, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x708, 0x6}, 0x1400, 0x14, 0x7, 0x5, 0x0, 0x1, 0x5}, r2, 0x10, 0xffffffffffffff9c, 0x0) r4 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r4, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r5, 0x400454cb, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, 0x0, 0x5df8c80b65d96feb) perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x100, 0x5, 0xfffffffffffffffd, 0x3e4bb98d, 0x0, 0xffffffff, 0x80, 0x8, 0x9, 0x7fe0, 0x4, 0xd8, 0x0, 0x400000000000, 0x20d2, 0x8, 0x6a, 0x8, 0x93c, 0x9, 0x3ff, 0x8, 0x3ff, 0x9, 0x5, 0x4917, 0x401, 0x9, 0x2edc, 0x1, 0xe0, 0x0, 0x4b, 0x100000001, 0x6, 0x7f, 0x0, 0x9, 0x2, @perf_bp={&(0x7f00000000c0), 0x1}, 0x0, 0x9, 0x6, 0x1, 0xff, 0x3, 0x6}, 0x0, 0x3, r3, 0x0) socketpair(0x10, 0x0, 0x3, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, 0x0, 0x400000, 0x0) socketpair(0x0, 0x3, 0xffffffffffff8000, &(0x7f0000000140)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x100000000000, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='pids.events\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6x\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000002c0)="3eddc005f9229e3dc401b214502a668662caf19b3ef323dd96a5d427b5492beb111e7dc613fa34798400d86493b3de13346e68918df60014cb84b483d172cf1a00b8e091dfd8c98ff13164c8ad002d53559d9cdc1cacf47f12fd2b1f05da30fc62cf44b0f36d0b46c77fc6a81132f51fd8806f0f40d49a8f1eefef11709f441c2638b2bb73ece8acbd827411276f9e771db332c8e068b9f3b0cc063a9353c6d29d368b2028bfc990c0180403", 0x0}, 0x20) [ 374.728579][T10129] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 04:01:11 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000080)="e1a28ee691c015498dd6f5dc0800", 0xe}], 0x1}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 04:01:11 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 374.799212][T10129] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 04:01:11 executing program 3: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:11 executing program 1: close(0xffffffffffffffff) r0 = socket$kcm(0x10, 0x40000000000002, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="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", 0xcfa}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f0000000f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0xfffffffffffffe59, &(0x7f0000003100), 0x0, &(0x7f0000003140)=""/29, 0x12f}, 0x0) recvmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000200)=@sco, 0x219, &(0x7f0000002b80), 0x100001bb, &(0x7f00000076c0)=""/156, 0xfffffffffffffe11, 0xfffffffffffffffa}, 0x0) recvmsg$kcm(r0, &(0x7f0000001400)={0x0, 0x0, 0x0}, 0x0) 04:01:11 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x2, [{}]}, @enum]}}, 0x0, 0x3a}, 0x20) 04:01:11 executing program 0: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r3) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000001980)=ANY=[@ANYBLOB="7000000000000000010000007f000000dca089d3f76d5db4cb6bf2eb8dc248c64d770cb48ab5f443a46a10d342614d8fa50b017d8b001c1ffaa3c3dc599eb5c46175f32454fc2c7f307283ebec37f3c43b1c9a3bd95d86ff2b09ff7d6e172322f042ee0000000000"], 0x68}, 0x800) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000080)='}GPLppp0ppp0!#\x00') r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r6, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) [ 375.169161][T10159] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.1'. 04:01:11 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x9, 0x80000, 0x6, &(0x7f0000000b80)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000002d00)={&(0x7f0000002600)=@hci, 0x80, &(0x7f0000002c80)=[{&(0x7f0000002680)=""/159, 0x9f}, {&(0x7f0000002740)=""/203, 0xcb}, {&(0x7f0000002840)=""/194, 0xc2}, {&(0x7f0000002940)=""/239, 0xef}, {&(0x7f0000002a40)=""/50, 0x32}, {&(0x7f0000002a80)=""/130, 0x82}, {&(0x7f0000002b40)}, {&(0x7f0000002b80)=""/195, 0xc3}], 0x8}, 0x40000000) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) r2 = getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = perf_event_open(&(0x7f0000000580)={0x5, 0x70, 0x1ff, 0x7, 0x93d, 0x0, 0x0, 0x325, 0x402, 0x8, 0x56, 0x2, 0x10000, 0x6, 0x1f, 0x7, 0x81, 0x58, 0x5e, 0xeee, 0x8000, 0x9, 0x5, 0xd7, 0x81, 0x3, 0x2, 0x4, 0x4, 0x4, 0x3e, 0x9, 0x4, 0x7, 0xffffffffffffff90, 0x2, 0x550, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x708, 0x6}, 0x1400, 0x14, 0x7, 0x5, 0x0, 0x1, 0x5}, r2, 0x10, 0xffffffffffffff9c, 0x0) r4 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r4, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r5, 0x400454cb, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, 0x0, 0x5df8c80b65d96feb) perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x100, 0x5, 0xfffffffffffffffd, 0x3e4bb98d, 0x0, 0xffffffff, 0x80, 0x8, 0x9, 0x7fe0, 0x4, 0xd8, 0x0, 0x400000000000, 0x20d2, 0x8, 0x6a, 0x8, 0x93c, 0x9, 0x3ff, 0x8, 0x3ff, 0x9, 0x5, 0x4917, 0x401, 0x9, 0x2edc, 0x1, 0xe0, 0x0, 0x4b, 0x100000001, 0x6, 0x7f, 0x0, 0x9, 0x2, @perf_bp={&(0x7f00000000c0), 0x1}, 0x0, 0x9, 0x6, 0x1, 0xff, 0x3, 0x6}, 0x0, 0x3, r3, 0x0) socketpair(0x10, 0x0, 0x3, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, 0x0, 0x400000, 0x0) socketpair(0x0, 0x3, 0xffffffffffff8000, &(0x7f0000000140)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x100000000000, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='pids.events\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6x\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000002c0)="3eddc005f9229e3dc401b214502a668662caf19b3ef323dd96a5d427b5492beb111e7dc613fa34798400d86493b3de13346e68918df60014cb84b483d172cf1a00b8e091dfd8c98ff13164c8ad002d53559d9cdc1cacf47f12fd2b1f05da30fc62cf44b0f36d0b46c77fc6a81132f51fd8806f0f40d49a8f1eefef11709f441c2638b2bb73ece8acbd827411276f9e771db332c8e068b9f3b0cc063a9353c6d29d368b2028bfc990c0180403", 0x0}, 0x20) 04:01:11 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:11 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="17", 0x1}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc, 0x7ffff000, &(0x7f0000002a80), 0x74, &(0x7f0000000080), 0x21a}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffff9c, 0x10, &(0x7f0000000040)={&(0x7f0000000000)=""/43, 0x2b, 0x0}}, 0x10) r2 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) openat$cgroup_type(r2, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100)=r1, 0x4) 04:01:12 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) recvmsg$kcm(r0, &(0x7f0000002c00)={&(0x7f00000017c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000001900)=""/210, 0x4260966a}], 0x1, 0x0, 0x20d}, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x44e, 0x6, 0x2, 0x1000, 0x0, 0x9, 0x4010, 0x8, 0x0, 0x0, 0x4, 0x0, 0x7, 0x1, 0x400, 0x0, 0xffffffffffffff80, 0x2, 0x0, 0x6, 0x400, 0x0, 0x9, 0x0, 0x5, 0x8, 0x0, 0x0, 0x5, 0x0, 0x62e627fd, 0x5, 0x9a9, 0x7f00, 0x9, 0x3ff, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x2}, 0x10, 0x7b6, 0x8, 0x8, 0x1a0, 0xfffffffffffffff7}, 0x0, 0x10, r1, 0x3) recvmsg(r0, &(0x7f0000000c40)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x2, 0x3}}, @func={0xf, 0x0, 0x0, 0xc, 0x1}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xd, 0x5}]}]}, {0x0, [0x0, 0x7f, 0x5f, 0x7f, 0x61, 0x3e]}}, 0xfffffffffffffffe, 0x58}, 0x20) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="160000001a0081aee4050c00000f00fe078bc36f1600", 0x16}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, r2, 0x0, 0x0, 0x0}, 0x30) 04:01:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x400000003, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000002b008161e45ae087000000000b0f0000000000bc5cc91b4dd65b2f0580cb7023072a556d1c958c002000", 0x2e}], 0x1}, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r1}) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)}, 0x80) 04:01:12 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000400)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000002c0)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb, 0x20, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0xc, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000004c0)=r1, 0x4) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r5, 0x0) r6 = socket$kcm(0xa, 0x100000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) sendmsg$kcm(r6, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0, 0x263}, 0x200008c4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz0\x00', 0x200002, 0x0) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r8 = perf_event_open(&(0x7f0000001740)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0xf, 0x2, 0x62c7, &(0x7f0000000580)={0x0, 0x0}) close(r9) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x1, 0xa84, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x5, 0x2, 0x800, 0x7f, 0x800, 0x42, 0x401, 0xff, 0x0, 0x4, 0x4, 0x6, 0x80, 0x6, 0x9, 0x80, 0x2, 0x7, 0x8, 0x10000, 0x3, 0xe83, 0xfffffffffffffff9, 0x1, 0xbca, 0x3ff, 0x7, 0x7fffffff, 0x0, 0x74f, 0x2, @perf_bp={0x0, 0x2}, 0x1100, 0x1, 0x3ff, 0x5, 0x8ba, 0x1f, 0x5}, 0x0, 0x1, r8, 0x0) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000300), 0x4) ioctl$TUNSETVNETHDRSZ(r5, 0x400454d8, &(0x7f00000003c0)=0x3) close(r7) r11 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r11, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 04:01:12 executing program 4: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffc1, 0x10}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={r1, &(0x7f0000000440)="eceb8c08dbfe594d8dfc874a0666aacd9a34f8dcdd9339d8fc9a7839591458a0a5e84dc3841a6c035cba9b8a47c144f0d84167ef21fd6d788d214455c57c4d81d3bb70cf07726878346bea7e5086f9a0c8098f5c7be8ea1ea9b19e64092da73a34c73e1d9707ffb0a8b72c0f15e0e1324750a0f5ba829791876b6de340b9f73dd6f899a08259b7a88edff519aa23f3b62dd47a0740b544d7f26fa1f029de8bc9e9184f9246359edc116cbf320cda5048714ec594852c645f74e3e50fa7fa5bfba1bcdf7f75c2304a3501bab3d9570308ff83b723758fd07ac1b1b15e5f257c", &(0x7f0000000540)=""/75}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000240)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x10\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='cgroup.controllers\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000640)='cpuset.effective_cpus\x00', 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0x80000001, 0x10}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000000c0)='./file0\x00', r3}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)='cpuset(\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x7f97, 0x3, 0x0, 0x0, 0x29e, 0x104, 0x0, 0x1e1, 0x0, 0x1, 0x2, 0x39c7, 0x2, 0x10000, 0x6, 0x14, 0x8000, 0x7dd, 0x7, 0x3, 0x6, 0x5, 0xfffffffffffffffd, 0xffffffffffffffff, 0x5, 0x8, 0x0, 0x3, 0x9, 0x9, 0xffffffff, 0x9, 0x3, 0x4, 0x100000001, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280)}, 0x20020, 0x3, 0x8, 0x2, 0x9, 0x8001}, r4, 0xc, 0xffffffffffffffff, 0xa) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r5, 0x400454cb, 0x1) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0xed, 0x4, 0x9, 0x6, 0x0, 0x3, 0x1, 0x7, 0x5, 0x8001, 0x80000001, 0x2, 0x9, 0x9, 0x9, 0xf8, 0x7, 0x5, 0x7, 0x1b, 0x4, 0x1b4, 0x4, 0x5, 0x12b8, 0xfffffffffffff801, 0x401, 0x8, 0xffffffff, 0x0, 0x24, 0x4, 0xff, 0x5a, 0x0, 0x3ff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x80, 0x75, 0xbb, 0x6, 0x1, 0x80000001, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 04:01:12 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x8000, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x0, 0x4161, 0x2, 0x7}]}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0x10) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000300)=""/46) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002c008151e00f80ecdb4cb904014865160b0001000c41000e000000140e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x81) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x40101, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000140)=""/55) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f0000000100)) 04:01:12 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x9, &(0x7f0000000080), 0x4) 04:01:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x9, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x544, 0xe, 0x5, 0x0, 0x0, 0x0, 0x5, 0x8, 0x6, 0x4, 0xcad, 0x0, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x2, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={&(0x7f0000000080)}, 0x8, 0x5, 0x3, 0x3, 0xa92, 0x1ff, 0x7fff}, r0, 0xb, r0, 0x8) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r2 = getpid() perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x0, 0x7fff, 0xff5a, 0x1, 0x0, 0xf949, 0x21, 0xd, 0x7fff, 0x9, 0x3, 0xf69, 0x0, 0x0, 0x81, 0x0, 0x28b, 0x2, 0x3, 0x76b, 0x3, 0xdf, 0xd6e, 0x0, 0x1, 0x7f, 0x1f, 0x5, 0x0, 0x1ff, 0x1, 0x8, 0xff, 0x143a, 0x7ec, 0x7f, 0x0, 0x8001, 0x2, @perf_bp={&(0x7f0000000200), 0x2}, 0x8, 0xfffffffffffffa6a, 0x100000000, 0xf, 0xffffffff7fffffff, 0x20, 0x97a7}, r2, 0x7, r1, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x81, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x80000001, 0x7, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffff11, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x1, 0x0, 0x4718}, 0x0, 0x0, 0xffffffffffffffff, 0x3) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000b80)='cpuacct.stat\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) 04:01:12 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:12 executing program 4: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:12 executing program 5: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4520cecff0e00fa078b5bdb4cb904e473730e55cff26d1b0e001d80020000005e510befccd7", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000000)=@vsock, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)="7b0336b79f6f240fd246f9882167ef12db09d941a3f853ca1232a46a2516803e9b6d43b4514574dcc6641fd5c3926bec1151ffda50aa7067b3461d9dbeb4a78ba45d958ba456d517f7eb78ffdd3325c8bf0f30652377c04f2ba335091955c92a9965a35c7b215501c1bc308512d96b447b89bdeabaf26a1f0ebc4cf1e9e1c93b186a998fd95bcb84bd909af7c251e0a52a49b1be608515bcb8684974ae1ffc115e36622668e0909f25d88a8dd1a039fef94172646cffb75254a27698efa7e154077c384dc2", 0xc5}, {&(0x7f0000000980)="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", 0x1000}], 0x2}, 0x840) 04:01:12 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x20) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r3, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r5, &(0x7f00000005c0), 0x12) write$cgroup_pid(r6, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r4, 0x0, 0xfd00) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 04:01:12 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 376.309347][T10240] netlink: 'syz-executor.5': attribute type 29 has an invalid length. [ 376.446449][T10240] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 04:01:13 executing program 5: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4520cecff0e00fa078b5bdb4cb904e473730e55cff26d1b0e001d80020000005e510befccd7", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000000)=@vsock, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)="7b0336b79f6f240fd246f9882167ef12db09d941a3f853ca1232a46a2516803e9b6d43b4514574dcc6641fd5c3926bec1151ffda50aa7067b3461d9dbeb4a78ba45d958ba456d517f7eb78ffdd3325c8bf0f30652377c04f2ba335091955c92a9965a35c7b215501c1bc308512d96b447b89bdeabaf26a1f0ebc4cf1e9e1c93b186a998fd95bcb84bd909af7c251e0a52a49b1be608515bcb8684974ae1ffc115e36622668e0909f25d88a8dd1a039fef94172646cffb75254a27698efa7e154077c384dc2", 0xc5}, {&(0x7f0000000980)="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", 0x1000}], 0x2}, 0x840) 04:01:13 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r0, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14}}], 0xf}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000003000000000000002c000001000000000000000095000000000000004503c1e0ee73a09f0b5bffcea4b823e8ab23e54cc5e3ee50d178b2d7eb744112b48721cc8f85013ee1b2c5b42cffff2210a012229933217b8a3e149a11819d0d31beff634e02a41fbbe42678c1f489cf4221b38f8451db8609151eb00dbc4c477d7db1f2ff6d0387174cd21318c9e897976126d29483380b3c109ea237d77437448cbb9d05f72da7d54cc9437242335919dfd414b9622a0ae71d9190329e53585706488e156055eccc81216fef4c8558a0270b3a310c18c5b079b3fd6890455d4a63ae7ce17dc9453f236d2f9916"], &(0x7f0000000080)='GPL\x00', 0x1f, 0x0, 0x0, 0x41100, 0x3, [], 0x0, 0xb, 0xffffffffffffff9c, 0x8, &(0x7f00000000c0)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x8, 0x6}, 0x10}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='\x00', r1}, 0x10) [ 376.696476][T10256] netlink: 'syz-executor.5': attribute type 29 has an invalid length. [ 376.749515][T10256] netlink: 'syz-executor.5': attribute type 29 has an invalid length. [ 376.761780][T10259] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 04:01:13 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x10, 0x800000000002, 0x0) recvmsg$kcm(r1, &(0x7f0000002c00)={&(0x7f00000017c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000001900)=""/210, 0x4260966a}], 0x1, 0x0, 0x20d}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={r2, r3, 0xb, 0x1}, 0x10) recvmsg$kcm(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000c40)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="160000001a0081aee4050c00000f00fe078bc36f1600", 0x16}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 04:01:13 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:13 executing program 5: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='.,\x84\x1a*oux\b', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f00000002c0)=@nfc, 0x2d4, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000280)=0x80) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfffffee1) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfffffffffffffe61) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x0, 0x2f, 0x0, &(0x7f0000000040)="d95f37be5845b7af58eea7b9954a90e8857093fd7113a09e689275cdde8415827cb347d74d61bbd49c494c74eb799c", 0x0, 0x2}, 0x28) close(0xffffffffffffffff) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000340)) sendmsg(r3, &(0x7f0000000140)={&(0x7f0000000380)=@un=@abs={0x1}, 0x3d, 0x0, 0x0, 0x0, 0x384}, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0xda4fff08) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x3}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x5, 0x0, 0x69d7, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f00000018c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000002940), 0x0, &(0x7f0000002980)=""/6, 0x6}, 0x12040) sendmsg$kcm(r1, &(0x7f0000002bc0)={&(0x7f0000002a00)=@can={0x1d, r6}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000002a80)}], 0x1}, 0x800) socket$kcm(0x29, 0x7, 0x0) 04:01:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r1, 0x1b, 0x1, 0xfffffffffffffffe, &(0x7f0000000040)=[0x0], 0x1}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYRES64=r3, @ANYRES64=r2, @ANYBLOB="e42fd7ca89395e8a881df25edfc1bead8f03d5f66b7033dfc77974433d5c23c583bab91276222a10eae3157f40dbedaf0ff709801194d42ceccb8bb2d339ab3e265852da5374da75d199e19fcc1768c792ed522cb05b0e4812cc83ca7c9dfbe221a0abe47e55afe7a07470509c61247022df928ecf7b2f3864187ca1caf65066b70cc55ef7891d5fec9b54c7b90866026e6ea8cf66f1f055bb6e037171fada216230198f3ca399c8bbb2dab7eb44", @ANYRES16=r1, @ANYRESDEC=r1, @ANYRESDEC=r1], 0xe8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x42400) mkdirat$cgroup(r4, &(0x7f0000000100)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 04:01:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b400000000000000540000000000000063014c0000008fbc1ecb9e283a710000798ae08e34f3f191c429e5a16ddde22af9cc98f703aa231872d0cd3c1332099788509a29105ab7c9609e742fa59a1b6ee6bcd4faafb3765653dc4c6718fdaf93308c23ccc96316793d8d9a09910c"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x18f}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe2, 0xe2, 0x8, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0x6}, {0x5, 0x2}, {0xa, 0x1}, {0x10, 0x1}, {0x0, 0x2}, {0x7, 0x1}, {0x9, 0x1}]}, @restrict={0x3, 0x0, 0x0, 0xb, 0x4}, @datasec={0x7, 0xa, 0x0, 0xf, 0x2, [{0x2, 0x8, 0x7}, {0x3, 0x9}, {0x1, 0x7ff, 0x8}, {0x4, 0x81, 0x5}, {0x1, 0x81, 0xfffffffffffffffa}, {0x5, 0xfff, 0x1000000000}, {0x2, 0x6, 0x3e2b}, {0x2, 0x5, 0x1c0000000000}, {0x4, 0x3, 0x4}, {0x3, 0x9}], "dade"}, @func={0x9, 0x0, 0x0, 0xc, 0x1}]}, {0x0, [0x61, 0x30, 0x0, 0x7f, 0x30, 0x5f]}}, &(0x7f0000000040)=""/47, 0x104, 0x2f, 0x1}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x0, 0x0) sendmsg$sock(r0, &(0x7f0000000480)={&(0x7f00000002c0)=@in6={0xa, 0x4e21, 0xa2, @ipv4={[], [], @remote}, 0x1000}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000340)="1b6994924256e92d3c969f3c18e8f30a745371ff4c2a0220f307e68db84478620251b0e7be93071d7aca647157f800fb4d6d48b9423f74e9ea", 0x39}], 0x1, &(0x7f00000003c0)=[@mark={{0x14, 0x1, 0x24, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x846}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0xd055f0c}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}], 0xa8}, 0x20000081) 04:01:13 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000400)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000002c0)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb, 0x20, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0xc, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000004c0)=r1, 0x4) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r5, 0x0) r6 = socket$kcm(0xa, 0x100000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) sendmsg$kcm(r6, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0, 0x263}, 0x200008c4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz0\x00', 0x200002, 0x0) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r8 = perf_event_open(&(0x7f0000001740)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0xf, 0x2, 0x62c7, &(0x7f0000000580)={0x0, 0x0}) close(r9) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x1, 0xa84, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x5, 0x2, 0x800, 0x7f, 0x800, 0x42, 0x401, 0xff, 0x0, 0x4, 0x4, 0x6, 0x80, 0x6, 0x9, 0x80, 0x2, 0x7, 0x8, 0x10000, 0x3, 0xe83, 0xfffffffffffffff9, 0x1, 0xbca, 0x3ff, 0x7, 0x7fffffff, 0x0, 0x74f, 0x2, @perf_bp={0x0, 0x2}, 0x1100, 0x1, 0x3ff, 0x5, 0x8ba, 0x1f, 0x5}, 0x0, 0x1, r8, 0x0) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000300), 0x4) ioctl$TUNSETVNETHDRSZ(r5, 0x400454d8, &(0x7f00000003c0)=0x3) close(r7) r11 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r11, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 04:01:13 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r1, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4}, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x6, 0xd2a, 0x9}, &(0x7f00000001c0)=0x8001, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3}}, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000013001707ed12806cd20010e52ae6a5dd80009d00010800f60000000300f87f0000640000000000000000", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:01:13 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:13 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x10, 0x800000000002, 0x0) recvmsg$kcm(r1, &(0x7f0000002c00)={&(0x7f00000017c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000001900)=""/210, 0x4260966a}], 0x1, 0x0, 0x20d}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={r2, r3, 0xb, 0x1}, 0x10) recvmsg$kcm(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000c40)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="160000001a0081aee4050c00000f00fe078bc36f1600", 0x16}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 04:01:13 executing program 5: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='.,\x84\x1a*oux\b', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f00000002c0)=@nfc, 0x2d4, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000280)=0x80) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfffffee1) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfffffffffffffe61) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x0, 0x2f, 0x0, &(0x7f0000000040)="d95f37be5845b7af58eea7b9954a90e8857093fd7113a09e689275cdde8415827cb347d74d61bbd49c494c74eb799c", 0x0, 0x2}, 0x28) close(0xffffffffffffffff) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000340)) sendmsg(r3, &(0x7f0000000140)={&(0x7f0000000380)=@un=@abs={0x1}, 0x3d, 0x0, 0x0, 0x0, 0x384}, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0xda4fff08) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x3}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x5, 0x0, 0x69d7, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f00000018c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000002940), 0x0, &(0x7f0000002980)=""/6, 0x6}, 0x12040) sendmsg$kcm(r1, &(0x7f0000002bc0)={&(0x7f0000002a00)=@can={0x1d, r6}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000002a80)}], 0x1}, 0x800) socket$kcm(0x29, 0x7, 0x0) 04:01:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="4fc582dcc9b28945c4440b5fa0be5576", 0x10}, {&(0x7f0000000200)="043b3f11f7222f91ea4796fab26d32b02894fb07045ec7ac1febb5eac77683de35d0a9624d0db515549b174fb013ac0a384245a427446bd97fad603b045c479717d61a8b19343092bf51ee9439c3a9ea65df3dcb9ed6c117a63be54b9999a1c1c7ffd5af7f05b5105bcff2926aca6ee888f296bbf8f7b06bdbd7d8359616e74d60bfab12193349e72654f19f20cddcb06ecf4b8ba9b36ab703ef8bdbd4d013cc71e649b62ebee51dd632600b", 0xac}, {&(0x7f00000002c0)="ca7e56bbcd5313b055f9f13f194d6eb589156c358a80a7abcb4bdafffcf7fb89e5e3731c741c9b23d061b14179d1641db28094a771c60511f3af9a5d53d691322aea3e3e339d46131e063c9bfca5761a298b2c818dd02f9d95c4e32bad", 0x5d}, {&(0x7f0000000340)="c15ff34f3157ab1026f08c990ba9969c0a7ab1ce59918c7cb90afeac7398577959d4a041dd4214872a5991f73a1433cd651caf6570b511288059c0884deb13535117", 0x42}], 0x4, &(0x7f0000002bc0)=ANY=[@ANYBLOB="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"], 0x10f8}, 0x40000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000006640)={&(0x7f00000052c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000065c0)=[{&(0x7f0000005340)=""/4096, 0x1000}, {&(0x7f0000006340)=""/72, 0x48}, {&(0x7f00000063c0)=""/201, 0xc9}, {&(0x7f00000064c0)=""/165, 0xa5}, {&(0x7f0000006580)=""/17, 0x11}], 0x5}, 0x2000) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000002b80)=r1) sendmsg$kcm(r0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001500)="a34e564a5fd68ff64eccb3881d8ece1aa739c686c3ec784fdc9e0273e56937eae00322762b1f55d077b6d4fb5f63feba4f47834c664c1e90799895d9be2385590d74e030640802aa957f5954b1962a50d32360691fe569bdccc8aa3e0125c58b894ad981577fb4a9", 0x1bb}, {&(0x7f0000001580)="30f025ba89ab37bac23a1b032ea92b34cefecaac3c33f844c90e0dcd0f6b76f09f5fc798730f160cc4f987f7391a5c0acacb302669dbc181b5a106f4a0e17bd72794c9c4e1ecc70ae04b3be4c5cb791270ff1e455e4ed072aa654a14ea4ba7d1e5f45b542c98e62bb8071992301e4f2fd3411e5569b2c80e18219e8c2756c46411295c088a26f2bba90be7892fdee37c06", 0xfffffffffffffd6a}, {&(0x7f0000001640)="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", 0xfc}, {&(0x7f0000001740)="b8153529bef81a1aa383b9ff0ee61dbf9bbceaeb0a07a582db57d86c7e349ccbaa118928918c33755f07f603b100746c1badda7932801a973d4975aca94ca8af254bb91ae01090a5dfdef8a61c2d584042c4438c0754fe11592ba774c2b7180fcd83f077606aa4a96b63eded44844e45b1f335b5c4451309827904dfcc43e195624b88d2d0bd64d8f22a3299dec8010905e0f5959bfe24f74f767cfd192e582fa7a5176d072a5662ad783abab6f876a6dde53c34654f98df82ebaa941de770617401f45d9ec02ab316b0f79297b6d10292d36b5a7326c69f067fe8ab", 0xdc}, {&(0x7f0000001840)="a403b4", 0x2e8}, {&(0x7f0000001880)}], 0x100000000000027c, &(0x7f0000001940)=[{0xffffff33, 0x115, 0x0, "4e568930492a1a159adb8d01329676f826e74649c24797e6d12933e3f0b8d2bda5dc3f090933ffdf6ffdcc6f0d04631eea8c5c966f52b96d26ffa9527290f1f843f7b4e098a5c5a57d5725d7f21f"}, {0xf0, 0x1ff, 0x5, "bdd2a8b03a4c3d75c4ecf81ad4bdc174acb39c55cac01c160a887a4facebda4449296f087da46d3f618cd2d0aebe52ab45b338ce06954d8b3e24133b98bb584bbae333978ffbad97ddf6973a41c8b7bf18ca5b29506dc5fefa4a1a2f5e4185e939cf9338d0c7bc213a219f6b84e734a1792c90c3a2cc23bd5cf68335445f43080b7b5fdbe6245b85a222e2dd30db926030a10162b1a32103324ce5c3836ebf58e054669a469e8a85de6002093f4646d62b08447309224a873da70e48fcff78c1d99c1b0e207c4350f0482e3b6ce738eede2cf9e0065d56c8eaa5"}, {0x1010, 0x102, 0x5a, "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"}, {0x50, 0x115, 0x1, "fe40b81b468f86b0a0824605128f2d88a449d6416e8b1134dff4e81550af97d4d82896e63abb1c95700569f13139586ccda0595192ad000000000000"}], 0xcc3}, 0x48080) r2 = socket$kcm(0x10, 0x2, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000002b40)={r0, 0x11, 0x1, 0x9, &(0x7f0000001880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="39000000140081ae0000dc676f97daf02ccc690e3fb23858af8423300b2c000500058701546fabca1b4e7d06a6580e88370200c54c1960b89c", 0x39}], 0x1}, 0x0) 04:01:14 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480), 0x4) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000004c0)=r1, 0x4) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000080)={r0}) setsockopt$sock_attach_bpf(r2, 0x1, 0x3d, &(0x7f0000000040), 0x8) 04:01:14 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:14 executing program 5: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='.,\x84\x1a*oux\b', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f00000002c0)=@nfc, 0x2d4, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000280)=0x80) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfffffee1) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfffffffffffffe61) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x0, 0x2f, 0x0, &(0x7f0000000040)="d95f37be5845b7af58eea7b9954a90e8857093fd7113a09e689275cdde8415827cb347d74d61bbd49c494c74eb799c", 0x0, 0x2}, 0x28) close(0xffffffffffffffff) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000340)) sendmsg(r3, &(0x7f0000000140)={&(0x7f0000000380)=@un=@abs={0x1}, 0x3d, 0x0, 0x0, 0x0, 0x384}, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0xda4fff08) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x3}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x5, 0x0, 0x69d7, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f00000018c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000002940), 0x0, &(0x7f0000002980)=""/6, 0x6}, 0x12040) sendmsg$kcm(r1, &(0x7f0000002bc0)={&(0x7f0000002a00)=@can={0x1d, r6}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000002a80)}], 0x1}, 0x800) socket$kcm(0x29, 0x7, 0x0) 04:01:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f00000000c0)=0x5, 0x12) 04:01:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0, 0x0, 0x0, 0x1d0}, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f00000000c0)=0x88) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, 0x0}, 0x0) socketpair(0x0, 0x0, 0x100000000000, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 04:01:14 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x280000, 0x0) socketpair(0x11, 0x6, 0x4, &(0x7f0000000080)) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'ip6gretap0\x00', 0x600}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r2, 0x0) 04:01:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000400)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000002c0)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb, 0x20, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0xc, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000004c0)=r1, 0x4) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r5, 0x0) r6 = socket$kcm(0xa, 0x100000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) sendmsg$kcm(r6, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0, 0x263}, 0x200008c4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz0\x00', 0x200002, 0x0) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r8 = perf_event_open(&(0x7f0000001740)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0xf, 0x2, 0x62c7, &(0x7f0000000580)={0x0, 0x0}) close(r9) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x1, 0xa84, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x5, 0x2, 0x800, 0x7f, 0x800, 0x42, 0x401, 0xff, 0x0, 0x4, 0x4, 0x6, 0x80, 0x6, 0x9, 0x80, 0x2, 0x7, 0x8, 0x10000, 0x3, 0xe83, 0xfffffffffffffff9, 0x1, 0xbca, 0x3ff, 0x7, 0x7fffffff, 0x0, 0x74f, 0x2, @perf_bp={0x0, 0x2}, 0x1100, 0x1, 0x3ff, 0x5, 0x8ba, 0x1f, 0x5}, 0x0, 0x1, r8, 0x0) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000300), 0x4) ioctl$TUNSETVNETHDRSZ(r5, 0x400454d8, &(0x7f00000003c0)=0x3) close(r7) r11 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r11, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 04:01:15 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x40, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000006b40)=""/4096, 0x1000}, {&(0x7f0000003b40)=""/4096, 0x1000}, {&(0x7f0000004b40)=""/4096, 0x1000}], 0x4}, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa048b5bdb4cb904e473730e55cff26d1b0e001d80fffffff05e510befccd7", 0x2e}], 0x1}, 0x0) 04:01:15 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x20000074, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffcf2, 0x10, 0x0, 0x398}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x214}}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000e100000000000000"], 0xc}, 0x0) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0xb5, 0x37, &(0x7f0000000040)="1f960d04123d8db65ba7853898adb9f12f23e9a177708504b870c4150b59784905d25b82402f032094cc121f700307dcdd8a26ae8bad39cdf6dd97e336ff6b2310c2de011ed949ebd7f0eca479fc9648181907d19d70b407952cd68a31b01c51683d9b7095349955b95e05c9e9c4a0f84b979532c3e3ff18f2757722979db9b477b59108c723c0e9bcad6d869026f0c94c43df07078f81c8a03876a8ae12d6985b03dd229d584afaaee13f79a556fc69dfd58ecb58", &(0x7f0000000240)=""/55, 0x200}, 0x28) write$cgroup_int(r2, &(0x7f0000000000)=0x100000000, 0x12) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)={r2}) 04:01:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='memory.current\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000980)={r1, r2}) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x54}]}, &(0x7f0000000080)='syzkaller\x00'}, 0x48) 04:01:15 executing program 2: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:15 executing program 5: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 378.993144][T10359] __nla_validate_parse: 9 callbacks suppressed [ 378.993240][T10359] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 379.011409][T10364] netlink: 'syz-executor.3': attribute type 29 has an invalid length. 04:01:15 executing program 4: socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x2a, 0xf, 0x80000000000003, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x400000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xf3bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffffffffffffc}, 0x0, 0xfffffffffffffffe, r2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) r4 = getpid() perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x1, 0x1, 0x1, 0x401, 0x0, 0x74b8, 0x40, 0x4, 0x7f, 0xf46, 0x9, 0x5, 0x0, 0x1, 0xfb8, 0x9, 0x7ff, 0x401, 0x1, 0x7, 0x5, 0x8, 0xc47, 0x4, 0x100000000, 0x1, 0x2, 0x80, 0x5a, 0xffffffffffff1502, 0xffffffff7fffffff, 0x1, 0x3ff, 0x577a87ea, 0x2, 0x9, 0x0, 0x96b, 0x4, @perf_bp={&(0x7f0000000240), 0x8}, 0x200, 0x7ff, 0xffff, 0x7, 0x38, 0x2000000000000000, 0x8}, r4, 0xe, 0xffffffffffffffff, 0x3) r5 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000000080), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000040)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0xf2, &(0x7f00000002c0), 0x0, 0x1a0}, 0x4000000000a712) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f0000000400)='cgroup.controllers\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f00000000c0)=@un=@file={0x0, './file0/../file0\x00'}, 0x80, &(0x7f0000000000)=[{&(0x7f00000015c0)="e7974f29719795eb4f94b88c1607418195ad1dbdc4d25613e0d1251c34c4a502b6cf05449eed1a1530985873196fa120920216adf1fba2583d362cce79061679a4782b847ddd1cba5e4f7069374d953afe66dc246364bb668fd53a899786ef21e605db323371577af5241eca8f10cb1461587bfaf954e095d94579587d10a0cb78b48cd52981e9c3f80169c8", 0x8c}], 0x1}, 0x8004) unlink(&(0x7f0000000380)='./file0/../file0\x00') [ 379.148242][T10364] netlink: 'syz-executor.3': attribute type 29 has an invalid length. [ 379.180446][T10346] netlink: 'syz-executor.3': attribute type 29 has an invalid length. 04:01:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x3, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x54}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:01:15 executing program 2: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 379.324146][T10358] netlink: 'syz-executor.3': attribute type 29 has an invalid length. 04:01:16 executing program 3: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x5, 0x70, 0x5, 0x135c, 0x401, 0x8000, 0x0, 0x9, 0x4, 0x8, 0x7, 0x1, 0x7fff, 0x6c8, 0x3dd6, 0x2, 0x6, 0x5, 0x5, 0x3ff, 0x3, 0x5, 0x4, 0x25, 0x4, 0x85, 0x2, 0x3, 0x3ff, 0x8, 0x6, 0xffffffff, 0x8ff9, 0x3, 0xdc, 0x100000001, 0x7, 0x7fff, 0x0, 0x1f, 0x4, @perf_config_ext={0x3, 0x8}, 0x1400, 0x80000001, 0xdaa, 0xd, 0x8, 0x7, 0x83}, 0xffffffffffffffff, 0x8, 0xffffffffffffff9c, 0x4) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0xfffffffffffffffe, 0x53, 0x4, 0x0, 0x1ff, 0x48, 0x3, 0x8000, 0x9, 0x81, 0x8, 0x81, 0x0, 0x2, 0x69, 0x4672725, 0xda, 0x8000, 0x4, 0x1, 0x1, 0x8001, 0x0, 0x9, 0x5, 0x4, 0x1, 0x81, 0xfff, 0x2, 0x800, 0x4, 0x5, 0x100000000, 0x74, 0x0, 0x81fc, 0x0, @perf_config_ext={0x20}, 0x4000, 0x2, 0x7, 0x2, 0x0, 0xf1d, 0xbd}, 0xffffffffffffffff, 0x10, r0, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="020043d05d25b666cd783f4b8e1c", 0x0, 0xc7a9}, 0x28) 04:01:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x10000, 0x1, 0x5, 0x3, 0x0, 0x3, 0x190a0, 0x1, 0x9, 0x8, 0x1, 0x8001, 0x8, 0x4, 0x9, 0x7, 0x7fffffff, 0x9, 0x1000, 0x3, 0x0, 0x100000001, 0x3, 0x80000001, 0x5, 0x2, 0x1, 0x7, 0x2ec, 0x1, 0x3, 0x4, 0x0, 0xa8, 0x1, 0x1000, 0x0, 0x1, 0x6, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10201, 0xc11, 0x2, 0x4, 0x23c, 0x2, 0x23}, 0xffffffffffffffff, 0x5, r2, 0x8) write$cgroup_type(r1, &(0x7f0000000100)='threaded\x00', 0xfffffffffffffd62) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000180)=0x8001) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) recvmsg(r1, &(0x7f000000a040)={&(0x7f0000009bc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000009f80)=[{&(0x7f0000009c40)=""/57, 0x39}, {&(0x7f0000009c80)=""/90, 0x5a}, {&(0x7f0000009d00)=""/159, 0x9f}, {&(0x7f0000009dc0)=""/133, 0x85}, {&(0x7f0000009e80)=""/14, 0xe}, {&(0x7f0000009ec0)=""/175, 0xaf}], 0x6, &(0x7f000000a000)=""/12, 0xc}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f000000a080)={0x12, 0xfeb4, 0x9, 0x100000001, 0x0, r0, 0xadd2, [], r3, r0, 0x2, 0x4}, 0x3c) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xfc', 0x40000) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0x9d1) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x0, &(0x7f00000002c0), &(0x7f0000000300)='GPL\x00', 0x8, 0x0, &(0x7f0000000340), 0x41f00, 0x2, [], r3, 0xa, r0, 0x8, &(0x7f0000000380)={0x9, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0xf, 0x10000, 0x3}, 0x10}, 0x70) 04:01:16 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000010008108040f80ecd34cb92e0a480e180f000000e8bd6efb120009000e001a00030000ff052005001204", 0x2e}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000540)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x4, 0x1, 0x1, 0x3}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000040)="e61ff3db1be80356a787d706e7de9b629790193f836cbd6d8df59f69c2dae62ccf626ea208e8d1681e7e64ff8fab8c7d258ca78050815bfd84", 0x39}, {&(0x7f0000000180)="cb67f3cca766c23306eaba1461283a5ea325d617f35cfef5dd5c03adc74764", 0x1f}, {&(0x7f00000001c0)="e433821076d1", 0x6}, {&(0x7f0000000200)="493a0130bc0ee49aee5fd769926fc9c5fc57e725", 0x14}, {&(0x7f0000000240)="b0bc7958c1cf8d9a984fd5efbc320c74d30df4a5e3304e4d09413906037ea5b55a5eb1cf550c7150b975607ae5493b8b316011594adf23d4ecdfc0c86eb2ff3be976e1d2071cce1857c1", 0x4a}, {&(0x7f00000002c0)="c18903daf93a956db0b99317fea356a1028d544be03133cf9a81a83784c76ec07e26c6648cf404396732be8cd16219ae32a5c555800eeba9524960e6287576df29", 0x41}], 0x6, &(0x7f00000003c0)=[{0x100, 0x109, 0x2, "679bd51c1b1e63e15f249f7447006cec995687b829c38e859603a1914c34eaa0dae8500de59689364a7514c0bdce94ee990b44d09428641924ea6614fc6871455affd24a0ecd0c75e4bfa5cb8cc42028caeb9a2aa41181712468304f49072287062aec3ad7c25f632e2eb2a0ec0ff20a15929f6d32dc9a258989c62d4b06701f6c59032a1c64e7f9ad30f7a465e6753920a28e31a8f771b830cb8a4ff93bed612bb0255841483585d0736715c86c5d7e406c8067804832e7dad7f8a0edc61ecb868c25cf6414837f06ea8818dbba12f23d2a10866f964e8901802370b9ded4061ddb3f56c113f31e2c66"}, {0x78, 0x1, 0x6, "dab5daae1f8ee75c9440ae237e949890124274c1e2abc98b6fd7b4e02fee60d4f6843e2ea9294c8eb8ea17fcba8f84f5e6d1113da46fd742ef0846b829ac5f1a27041941f8f9efb372646fe5db932efc520a7b4858f53fd2696aa3f0494b42de6eada55e25"}], 0x178}, 0x40001) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000005c0)={0x1, 0x70, 0xbaa, 0x2, 0x0, 0x1, 0x0, 0xdf10, 0x208, 0x1, 0x3f, 0x81, 0x9, 0x1200, 0xffffffffffffffe0, 0x3, 0x1ff, 0x4, 0xfffffffffffff0bd, 0x9, 0x7fff, 0x7fffffff, 0x3, 0x0, 0x800, 0x8, 0x3f, 0x55, 0x40, 0x9, 0x4, 0x2, 0x4, 0x2, 0x9, 0x6, 0x1, 0x3, 0x0, 0x8001, 0x2, @perf_bp={&(0x7f0000000580), 0xc}, 0x2a008, 0x6b8, 0x1000, 0x1, 0xb816, 0x4}, r1, 0x1, 0xffffffffffffff9c, 0x4) 04:01:16 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x4) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) 04:01:16 executing program 2: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:16 executing program 1: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'batadv0\x00', 0x200}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000100)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff000}, {0x16}]}) 04:01:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000480)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xfffffffd}}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/9, 0x9}, {&(0x7f0000000040)=""/190, 0xbe}, {&(0x7f0000000280)=""/161, 0xa1}, {&(0x7f0000000100)=""/110, 0x6e}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000340)=""/51, 0x33}], 0x6, &(0x7f0000000400)=""/64, 0x40}, 0x1) close(r0) 04:01:16 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x4e, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x9, &(0x7f0000000040)=@raw=[@generic={0x1, 0x200, 0x20, 0x9, 0x100000001}, @ldst={0x2, 0x2, 0x0, 0x0, 0x6, 0x40, 0x10}, @map={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x3, 0x2, 0x3, 0x0, 0xb, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x3, 0x3, 0x6, 0xf, 0xffffffffffffffe1, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x2}, @generic={0x8, 0x2, 0x0, 0x8}], &(0x7f00000000c0)='syzkaller\x00', 0x2, 0xbb, &(0x7f0000000100)=""/187, 0x40f00, 0x2, [], 0x0, 0x1b, 0xffffffffffffff9c, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x9, 0x9}, 0x10}, 0x70) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f00000002c0)=r2) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000300)=r1, 0x4) 04:01:16 executing program 4: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:16 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000480)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xfffffffd}}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/9, 0x9}, {&(0x7f0000000040)=""/190, 0xbe}, {&(0x7f0000000280)=""/161, 0xa1}, {&(0x7f0000000100)=""/110, 0x6e}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000340)=""/51, 0x33}], 0x6, &(0x7f0000000400)=""/64, 0x40}, 0x1) close(r0) 04:01:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000480)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xfffffffd}}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/9, 0x9}, {&(0x7f0000000040)=""/190, 0xbe}, {&(0x7f0000000280)=""/161, 0xa1}, {&(0x7f0000000100)=""/110, 0x6e}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000340)=""/51, 0x33}], 0x6, &(0x7f0000000400)=""/64, 0x40}, 0x1) close(r0) 04:01:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) recvmsg(r0, &(0x7f00000007c0)={&(0x7f0000000500)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000580)=""/227, 0xe3}, {&(0x7f0000000680)=""/22, 0x16}, {&(0x7f00000006c0)=""/3, 0x3}], 0x3, &(0x7f0000000740)=""/101, 0x65}, 0xad6831ba4a1d0712) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0x2, &(0x7f0000346fc8)=@raw=[@call={0x85, 0x0, 0x0, 0x1f}, @exit], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 04:01:16 executing program 1: r0 = socket$kcm(0x29, 0x8, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x80108906, 0x0) socket$kcm(0x29, 0x7, 0x0) 04:01:16 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000240)="2f9caac4b7f35613226f8188177cb6e7b6e15f84c96aea13586a456d90c9c41540cd4b81bbd00c5a4a0c7717a4dbdfa6bd580ba92a2b6e2eefd491b1408bffc8e8810f06c3151b75fad6c17703326a2926f028aa3c8dec8bfa6dd6ce8b882f8648a8574cdc3f7c7e8ed30775b0e3f17b984be1f628327a130ccef9c379165463e6376c918aee91ca8507948ae87a530d4c5a83bea3afe37b06983a6d8c3774655afd", 0xa2}], 0x1, &(0x7f0000000300)=[@ip_retopts={{0x10}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5d}}, @ip_retopts={{0x68, 0x0, 0x7, {[@ssrr={0x89, 0xf, 0x7, [@rand_addr=0x3f, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0x18, 0x6, 0x0, 0x7, [{[], 0x4}, {[@multicast2], 0x8}, {[@empty], 0x3}]}, @rr={0x7, 0x2b, 0xb2c, [@multicast2, @local, @loopback, @remote, @loopback, @remote, @empty, @empty, @rand_addr, @loopback]}, @ra={0x94, 0x6, 0x4}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}], 0xc0}, 0x8000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000007640)={&(0x7f0000006540)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006600)=[{&(0x7f00000065c0)=""/5, 0x5}], 0x1, &(0x7f0000006640)=""/4096, 0x1000}, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000007740)={&(0x7f0000007680)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000003000000000000000000000300000000030000000300000001000000050000000000000204000000ecff000000000001000000001c002e01005f00"], &(0x7f0000007700)=""/11, 0x4f, 0xb}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000007780)={0x1d, 0x1ff, 0x9, 0x3, 0x14, r1, 0x3, [], r3, r4, 0x5, 0x3}, 0x3c) recvmsg(0xffffffffffffff9c, &(0x7f0000002fc0)={&(0x7f00000019c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000030c0)=[{&(0x7f0000001a40)=""/199, 0xc7}, {&(0x7f0000001b40)=""/95, 0x5f}, {&(0x7f0000001bc0)=""/15, 0xf}, {&(0x7f0000001c00)=""/213, 0xd5}, {&(0x7f0000001d00)=""/173, 0xad}, {&(0x7f0000001dc0)=""/222, 0xde}, {&(0x7f0000001ec0)=""/115, 0x73}, {&(0x7f0000001f40)=""/106, 0x6a}, {&(0x7f0000001fc0)=""/4096, 0x1000}, {&(0x7f0000003040)=""/91, 0x5b}], 0xa, &(0x7f0000003180)=""/247, 0xf7}, 0x40) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003280)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000032c0)={0x0, 0x7, 0x1, 0x0, 0x20, r1, 0x7, [], r5, r6, 0x4, 0x1}, 0x3c) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r2}, 0x10) r7 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000200)={r1, &(0x7f00000000c0), 0x0}, 0x18) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 04:01:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x1ff) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x1ff) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x8000000000003) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x1f00, 0x0, 0x0, 0x0, &(0x7f0000000640)={0x7, 0x1}, 0x0, 0x0, &(0x7f0000000680)={0x3, 0x6, 0x8001}, &(0x7f00000006c0)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0xffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000880)={r2, 0x10, &(0x7f0000000840)={&(0x7f0000000580)=""/160, 0xa0, r4}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0xfffffffffffffff7, 0xf33, 0x0, 0x3, 0x0, 0x1, 0x8, 0x5, 0x800, 0x3, 0x4, 0x441, 0x7ff, 0x8, 0x2, 0x101, 0x8, 0x100, 0xdab, 0x381b, 0x7f, 0x1ff, 0x2, 0x8, 0x2, 0x1, 0x6, 0x8001, 0x7, 0x7fffffff, 0x2, 0xff, 0x10000, 0x5, 0x7fffffff, 0x5, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000480), 0xb}, 0x4, 0x2c08, 0x6, 0x4, 0x10001, 0x0, 0x100000001}, 0xffffffffffffffff, 0x7, r2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="9702e80ebe1f2b7d7e94bd9760e2223501bd1d5dc3526797a6f89d78ce4fe1b80014886257da97846a75b1a7b9eb573db16564022f0575225b3e1364979c7f878c34fcee7a816c47ac420324b6253e737e66c3fb9fe4d9b5b862356061e81baea412b7a298780b0b6d66e441dce269cbe842750b0fc12dda4a563193d2a6d68f48a2587a5d9626d3a886fce742e404c84b85577cb7ba17e338bbbab00ad80dc58a606095d70cff1601808905e636a5c6e2eecbb6bf88ff00000000"], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x4, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4, 0x3, 0x33c, 0xfff, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x20000, 0x7, 0x0, 0x2, 0x9, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r5, &(0x7f0000000200)=0xf5860200, 0x43400) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) r6 = openat$cgroup(r5, &(0x7f0000000440)='\xfd\xffz1\x00', 0x200002, 0x0) socketpair$tipc(0x1e, 0x1000000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={r2, r3, 0x9, 0x3}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0xa, 0x1, 0x3ff, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) recvmsg$kcm(r7, &(0x7f000000ca40)={&(0x7f000000c800)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000c9c0)=[{&(0x7f000000c880)}, {&(0x7f000000c8c0)=""/110, 0x6e}, {&(0x7f000000c940)=""/112, 0x70}], 0x3, &(0x7f000000ca00)=""/33, 0x21}, 0x1) bpf$MAP_CREATE(0x0, &(0x7f000000ca80)={0x1f, 0x1f, 0x7, 0x800, 0x10, r3, 0x263, [], r8, 0xffffffffffffffff, 0x5, 0x4}, 0x3c) openat$cgroup_procs(r6, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 04:01:17 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpuacct.usage\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0x1, 0x12) 04:01:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xf, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socket$kcm(0x10, 0x400800000000000, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r1, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) sendmsg(r2, &(0x7f0000000140)={&(0x7f0000000200)=@isdn={0x22, 0x1f, 0xffffffff, 0x400, 0x4}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000006c0)="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", 0x1000}], 0x1}, 0x50) 04:01:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400202) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x2f, 'io'}]}, 0x4) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da802003f000000, 0x5000027) 04:01:17 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000007980)={&(0x7f0000007740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000007900)=[{&(0x7f00000077c0)=""/84, 0x54}, {&(0x7f0000007840)=""/157, 0x9d}], 0x2, &(0x7f0000007940)=""/29, 0x1d}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000079c0)='memory.stat\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007a80)={0xd, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, [@exit, @alu={0x4, 0x4c1, 0xa, 0x9, 0x5, 0xfffffffffffffff0, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x23}, @ldst={0x3, 0x3, 0x1, 0xf, 0x6, 0xfffffffffffffffe, 0xfffffffffffffffc}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x5e, &(0x7f0000000100)=""/94, 0x40f00, 0x3, [], r0, 0xc, r1, 0x8, &(0x7f0000007a00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000007a40)={0x5, 0x2, 0x4, 0x101}, 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xc, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x21, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) 04:01:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x0, 0x9, 0x6, 0x8}, 0x80, 0x0, 0x0, 0x0, 0x38a}, 0x40) socketpair(0x0, 0x0, 0x100000000000, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='io.bfq.weight\x00', 0x2, 0x0) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 04:01:17 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 380.842550][T10459] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 380.896790][ T24] audit: type=1804 audit(1560830477.552:36): pid=10466 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir673334256/syzkaller.fmkcFH/34/memory.events" dev="sda1" ino=16787 res=1 04:01:17 executing program 1: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:17 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:17 executing program 1: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:17 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x2, [{}]}, @enum]}}, 0x0, 0x3a}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={r0, 0x10, &(0x7f0000000100)={&(0x7f0000000080)=""/87, 0x57, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r0, 0x10, &(0x7f0000000180)={&(0x7f0000000000)=""/108, 0x6c, r1}}, 0x10) 04:01:18 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 381.374334][T10473] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 04:01:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x1ff) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x1ff) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x8000000000003) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x1f00, 0x0, 0x0, 0x0, &(0x7f0000000640)={0x7, 0x1}, 0x0, 0x0, &(0x7f0000000680)={0x3, 0x6, 0x8001}, &(0x7f00000006c0)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0xffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000880)={r2, 0x10, &(0x7f0000000840)={&(0x7f0000000580)=""/160, 0xa0, r4}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0xfffffffffffffff7, 0xf33, 0x0, 0x3, 0x0, 0x1, 0x8, 0x5, 0x800, 0x3, 0x4, 0x441, 0x7ff, 0x8, 0x2, 0x101, 0x8, 0x100, 0xdab, 0x381b, 0x7f, 0x1ff, 0x2, 0x8, 0x2, 0x1, 0x6, 0x8001, 0x7, 0x7fffffff, 0x2, 0xff, 0x10000, 0x5, 0x7fffffff, 0x5, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000480), 0xb}, 0x4, 0x2c08, 0x6, 0x4, 0x10001, 0x0, 0x100000001}, 0xffffffffffffffff, 0x7, r2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="9702e80ebe1f2b7d7e94bd9760e2223501bd1d5dc3526797a6f89d78ce4fe1b80014886257da97846a75b1a7b9eb573db16564022f0575225b3e1364979c7f878c34fcee7a816c47ac420324b6253e737e66c3fb9fe4d9b5b862356061e81baea412b7a298780b0b6d66e441dce269cbe842750b0fc12dda4a563193d2a6d68f48a2587a5d9626d3a886fce742e404c84b85577cb7ba17e338bbbab00ad80dc58a606095d70cff1601808905e636a5c6e2eecbb6bf88ff00000000"], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x4, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4, 0x3, 0x33c, 0xfff, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x20000, 0x7, 0x0, 0x2, 0x9, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r5, &(0x7f0000000200)=0xf5860200, 0x43400) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) r6 = openat$cgroup(r5, &(0x7f0000000440)='\xfd\xffz1\x00', 0x200002, 0x0) socketpair$tipc(0x1e, 0x1000000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={r2, r3, 0x9, 0x3}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0xa, 0x1, 0x3ff, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) recvmsg$kcm(r7, &(0x7f000000ca40)={&(0x7f000000c800)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000c9c0)=[{&(0x7f000000c880)}, {&(0x7f000000c8c0)=""/110, 0x6e}, {&(0x7f000000c940)=""/112, 0x70}], 0x3, &(0x7f000000ca00)=""/33, 0x21}, 0x1) bpf$MAP_CREATE(0x0, &(0x7f000000ca80)={0x1f, 0x1f, 0x7, 0x800, 0x10, r3, 0x263, [], r8, 0xffffffffffffffff, 0x5, 0x4}, 0x3c) openat$cgroup_procs(r6, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 04:01:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x1ff) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x1ff) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x8000000000003) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x1f00, 0x0, 0x0, 0x0, &(0x7f0000000640)={0x7, 0x1}, 0x0, 0x0, &(0x7f0000000680)={0x3, 0x6, 0x8001}, &(0x7f00000006c0)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0xffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000880)={r2, 0x10, &(0x7f0000000840)={&(0x7f0000000580)=""/160, 0xa0, r4}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0xfffffffffffffff7, 0xf33, 0x0, 0x3, 0x0, 0x1, 0x8, 0x5, 0x800, 0x3, 0x4, 0x441, 0x7ff, 0x8, 0x2, 0x101, 0x8, 0x100, 0xdab, 0x381b, 0x7f, 0x1ff, 0x2, 0x8, 0x2, 0x1, 0x6, 0x8001, 0x7, 0x7fffffff, 0x2, 0xff, 0x10000, 0x5, 0x7fffffff, 0x5, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000480), 0xb}, 0x4, 0x2c08, 0x6, 0x4, 0x10001, 0x0, 0x100000001}, 0xffffffffffffffff, 0x7, r2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="9702e80ebe1f2b7d7e94bd9760e2223501bd1d5dc3526797a6f89d78ce4fe1b80014886257da97846a75b1a7b9eb573db16564022f0575225b3e1364979c7f878c34fcee7a816c47ac420324b6253e737e66c3fb9fe4d9b5b862356061e81baea412b7a298780b0b6d66e441dce269cbe842750b0fc12dda4a563193d2a6d68f48a2587a5d9626d3a886fce742e404c84b85577cb7ba17e338bbbab00ad80dc58a606095d70cff1601808905e636a5c6e2eecbb6bf88ff00000000"], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x4, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4, 0x3, 0x33c, 0xfff, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x20000, 0x7, 0x0, 0x2, 0x9, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r5, &(0x7f0000000200)=0xf5860200, 0x43400) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) r6 = openat$cgroup(r5, &(0x7f0000000440)='\xfd\xffz1\x00', 0x200002, 0x0) socketpair$tipc(0x1e, 0x1000000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={r2, r3, 0x9, 0x3}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0xa, 0x1, 0x3ff, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) recvmsg$kcm(r7, &(0x7f000000ca40)={&(0x7f000000c800)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000c9c0)=[{&(0x7f000000c880)}, {&(0x7f000000c8c0)=""/110, 0x6e}, {&(0x7f000000c940)=""/112, 0x70}], 0x3, &(0x7f000000ca00)=""/33, 0x21}, 0x1) bpf$MAP_CREATE(0x0, &(0x7f000000ca80)={0x1f, 0x1f, 0x7, 0x800, 0x10, r3, 0x263, [], r8, 0xffffffffffffffff, 0x5, 0x4}, 0x3c) openat$cgroup_procs(r6, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 04:01:18 executing program 0: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:18 executing program 4: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:18 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) r2 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="2b6391badd7d9017e020698bd75c19ac4efb7075202b70696473202f72646d61202f6d65bc6f7279202d70000000802d6d65"], 0x32) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x3e8, 'memory'}]}, 0xfdef) 04:01:18 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:18 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:18 executing program 3: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(r0, &(0x7f0000000400), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open(&(0x7f00000005c0)={0x3, 0x70, 0x100000001, 0x9, 0x0, 0x1, 0x0, 0x38, 0x40000, 0x2, 0x0, 0x9, 0x0, 0x10000, 0x3ff, 0x9, 0x4, 0x3, 0xb39, 0x0, 0x4, 0x0, 0x0, 0x20, 0x48e, 0x1, 0xc4, 0x3, 0x10000, 0x4, 0xffffffff80000000, 0x800, 0x5, 0x0, 0x648, 0x2, 0x0, 0xe28, 0x0, 0xe78, 0x2, @perf_bp={0x0, 0xa}, 0x808, 0x40, 0xda5d, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1) socketpair(0x2, 0x803, 0x81, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) recvmsg(r1, &(0x7f0000025940)={&(0x7f0000025780)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000025800), 0x0, &(0x7f0000025840)=""/252, 0xfc}, 0x42) bpf$MAP_CREATE(0x0, &(0x7f0000025980)={0x2, 0x80, 0x4, 0x800000000000, 0x0, r0, 0x7ff, [], r2, r1}, 0x3c) unlink(&(0x7f0000000040)='./file0\x00') r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={r3, 0x6, 0x1, 0xff, &(0x7f0000000500)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0)=0x1, 0x12) 04:01:18 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x7, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, 0x0, &(0x7f0000000140)}, 0x41) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x3) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, 0x0, &(0x7f0000000140)=""/1}, 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000001300)={0xffffffffffffff9c}) openat$cgroup_ro(r1, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001340)) close(r0) 04:01:18 executing program 0: r0 = socket$kcm(0x10, 0x7, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r0}) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000380)="2e0000003500817ee45de087185082cf0300b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 04:01:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000180)={r0}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x18}, 0x10) recvmsg(r0, &(0x7f0000002d00)={&(0x7f0000001980)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000002c80)=[{&(0x7f0000001a00)=""/4096, 0x1000}, {&(0x7f0000002a00)=""/163, 0xa3}, {&(0x7f0000002ac0)=""/187, 0xbb}, {&(0x7f0000002b80)=""/251, 0xfb}], 0x4, &(0x7f0000002cc0)}, 0x160) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e40)={&(0x7f0000002d40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@func={0xc, 0x0, 0x0, 0xc, 0x4}]}, {0x0, [0x7f, 0x2e, 0x0, 0x61]}}, &(0x7f0000002d80)=""/152, 0x2a, 0x98}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000002e80)={0x17, 0x1, 0x2, 0x200, 0x20, r2, 0x7, [], r3, r4, 0x4, 0x1}, 0x3c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0x100000001}, 0xc) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000067c0)={0x14, 0x0, 0x101, 0x3, 0x80, r5, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) perf_event_open(&(0x7f0000000900)={0x1, 0x45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x2, 0x73) sendmsg$kcm(r6, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r8 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, 0x20820000, r8}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000280)={r7}) 04:01:19 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x1ff) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x1ff) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x8000000000003) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x1f00, 0x0, 0x0, 0x0, &(0x7f0000000640)={0x7, 0x1}, 0x0, 0x0, &(0x7f0000000680)={0x3, 0x6, 0x8001}, &(0x7f00000006c0)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0xffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000880)={r2, 0x10, &(0x7f0000000840)={&(0x7f0000000580)=""/160, 0xa0, r4}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0xfffffffffffffff7, 0xf33, 0x0, 0x3, 0x0, 0x1, 0x8, 0x5, 0x800, 0x3, 0x4, 0x441, 0x7ff, 0x8, 0x2, 0x101, 0x8, 0x100, 0xdab, 0x381b, 0x7f, 0x1ff, 0x2, 0x8, 0x2, 0x1, 0x6, 0x8001, 0x7, 0x7fffffff, 0x2, 0xff, 0x10000, 0x5, 0x7fffffff, 0x5, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000480), 0xb}, 0x4, 0x2c08, 0x6, 0x4, 0x10001, 0x0, 0x100000001}, 0xffffffffffffffff, 0x7, r2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="9702e80ebe1f2b7d7e94bd9760e2223501bd1d5dc3526797a6f89d78ce4fe1b80014886257da97846a75b1a7b9eb573db16564022f0575225b3e1364979c7f878c34fcee7a816c47ac420324b6253e737e66c3fb9fe4d9b5b862356061e81baea412b7a298780b0b6d66e441dce269cbe842750b0fc12dda4a563193d2a6d68f48a2587a5d9626d3a886fce742e404c84b85577cb7ba17e338bbbab00ad80dc58a606095d70cff1601808905e636a5c6e2eecbb6bf88ff00000000"], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x4, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4, 0x3, 0x33c, 0xfff, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x20000, 0x7, 0x0, 0x2, 0x9, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r5, &(0x7f0000000200)=0xf5860200, 0x43400) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) r6 = openat$cgroup(r5, &(0x7f0000000440)='\xfd\xffz1\x00', 0x200002, 0x0) socketpair$tipc(0x1e, 0x1000000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={r2, r3, 0x9, 0x3}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0xa, 0x1, 0x3ff, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) recvmsg$kcm(r7, &(0x7f000000ca40)={&(0x7f000000c800)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000c9c0)=[{&(0x7f000000c880)}, {&(0x7f000000c8c0)=""/110, 0x6e}, {&(0x7f000000c940)=""/112, 0x70}], 0x3, &(0x7f000000ca00)=""/33, 0x21}, 0x1) bpf$MAP_CREATE(0x0, &(0x7f000000ca80)={0x1f, 0x1f, 0x7, 0x800, 0x10, r3, 0x263, [], r8, 0xffffffffffffffff, 0x5, 0x4}, 0x3c) openat$cgroup_procs(r6, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 04:01:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x1ff) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x1ff) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x8000000000003) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x1f00, 0x0, 0x0, 0x0, &(0x7f0000000640)={0x7, 0x1}, 0x0, 0x0, &(0x7f0000000680)={0x3, 0x6, 0x8001}, &(0x7f00000006c0)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0xffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000880)={r2, 0x10, &(0x7f0000000840)={&(0x7f0000000580)=""/160, 0xa0, r4}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0xfffffffffffffff7, 0xf33, 0x0, 0x3, 0x0, 0x1, 0x8, 0x5, 0x800, 0x3, 0x4, 0x441, 0x7ff, 0x8, 0x2, 0x101, 0x8, 0x100, 0xdab, 0x381b, 0x7f, 0x1ff, 0x2, 0x8, 0x2, 0x1, 0x6, 0x8001, 0x7, 0x7fffffff, 0x2, 0xff, 0x10000, 0x5, 0x7fffffff, 0x5, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000480), 0xb}, 0x4, 0x2c08, 0x6, 0x4, 0x10001, 0x0, 0x100000001}, 0xffffffffffffffff, 0x7, r2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="9702e80ebe1f2b7d7e94bd9760e2223501bd1d5dc3526797a6f89d78ce4fe1b80014886257da97846a75b1a7b9eb573db16564022f0575225b3e1364979c7f878c34fcee7a816c47ac420324b6253e737e66c3fb9fe4d9b5b862356061e81baea412b7a298780b0b6d66e441dce269cbe842750b0fc12dda4a563193d2a6d68f48a2587a5d9626d3a886fce742e404c84b85577cb7ba17e338bbbab00ad80dc58a606095d70cff1601808905e636a5c6e2eecbb6bf88ff00000000"], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x4, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4, 0x3, 0x33c, 0xfff, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x20000, 0x7, 0x0, 0x2, 0x9, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r5, &(0x7f0000000200)=0xf5860200, 0x43400) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) r6 = openat$cgroup(r5, &(0x7f0000000440)='\xfd\xffz1\x00', 0x200002, 0x0) socketpair$tipc(0x1e, 0x1000000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={r2, r3, 0x9, 0x3}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0xa, 0x1, 0x3ff, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) recvmsg$kcm(r7, &(0x7f000000ca40)={&(0x7f000000c800)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000c9c0)=[{&(0x7f000000c880)}, {&(0x7f000000c8c0)=""/110, 0x6e}, {&(0x7f000000c940)=""/112, 0x70}], 0x3, &(0x7f000000ca00)=""/33, 0x21}, 0x1) bpf$MAP_CREATE(0x0, &(0x7f000000ca80)={0x1f, 0x1f, 0x7, 0x800, 0x10, r3, 0x263, [], r8, 0xffffffffffffffff, 0x5, 0x4}, 0x3c) openat$cgroup_procs(r6, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 04:01:19 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x7, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, 0x0, &(0x7f0000000140)}, 0x41) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x3) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, 0x0, &(0x7f0000000140)=""/1}, 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000001300)={0xffffffffffffff9c}) openat$cgroup_ro(r1, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001340)) close(r0) 04:01:19 executing program 0: r0 = socket$kcm(0x2, 0x5, 0x84) sendmsg$kcm(r0, &(0x7f0000002700)={&(0x7f0000000140)=@nl=@unspec, 0x80, 0x0}, 0x20008004) recvmsg$kcm(r0, &(0x7f0000007f00)={&(0x7f00000068c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000006940)=""/231, 0xe7}, {&(0x7f0000006a40)=""/108, 0x6c}, {&(0x7f0000006ac0)=""/8, 0x8}, {&(0x7f0000006b00)=""/84, 0x54}, {&(0x7f0000006b80)=""/4096, 0x1000}, {&(0x7f0000007b80)=""/106, 0x6a}, {&(0x7f0000007c00)=""/188, 0xbc}, {&(0x7f0000007cc0)=""/10, 0xa}, {&(0x7f0000007d00)=""/178, 0xb2}], 0x9, &(0x7f0000007e80)=""/126, 0x7e}, 0x20) sendmsg$kcm(r0, &(0x7f0000008280)={&(0x7f0000007f40)=@can={0x1d, r1}, 0x80, &(0x7f0000008180)=[{&(0x7f0000007fc0)="8a852407b57c7bfb3b7bab2fc660e30380c1eb6b53f9f3bf68bc3d0fe2860054fe2a5a26b5f9cafc5fe78727bbc7cf699f68feb467569e6df909a5b8ca8a386c1ab441f02ea88eadefed720dd0e8d07ccdcfa7f610c4a9cba54e58d64caf9888ffee431e41df9ae05553", 0x6a}, {&(0x7f0000008040)="aedcb73a58db47b689218d0b7b43b0f202ec0ac293dbf24acce63bba76b84d68621882995c75e291bb69c23e9a5d7c4a5f081935a0480e4291ed0a63276b88ffcb720e22639800ddfc33d09aeae689ce7e22ec43f2d91c5ee66d014b1097bc62893678bfc125dacc9b1fa5f8003aebcae21b76905fac6a948777e3953b78019892939769c490348d8e48abc95bc19f85682f6b9b15cb80c0ee6305d836fd519e8cee7eca1755ef23072479d675f4b2695f5a1ccb34046cf07dadf521785aa23e198fad", 0xc3}, {&(0x7f0000008140)="c79d4372e3b226e23bba78193da0a34989dbaccfafd42280589ba00382ed1595cb2fcbc8e1dd2e187b944f316b2aa6aa0c", 0x31}], 0x3, &(0x7f00000081c0)=[{0xa8, 0x13b, 0x2, "d27385090c35a6d219f707b99d0c166a7abed21108f444db894c596a0f5bcd73407254ae713b077a1d82d5824ba0586e7987c06efa20c57058d27b97197714cd6e0f595a9a3e93fba137091e3c7ea424cf72ac6bb3a3adcb154938a0084c082f09caac1e171063e65ce4e882de9082c549eaef71ceaa564ead59eee9e408fe71152acfb315f3258c2369905a19e0b01e9da365"}], 0xa8}, 0x20044000) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000300)=[{&(0x7f0000000000)="771215fa36ee2c9c2aa383c804644315", 0x10}], 0x1}, 0x0) 04:01:19 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:19 executing program 0: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x4, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1c05000000000000000000000000611008000000000095000000000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9a, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 04:01:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='veth0\x00') ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000000)) 04:01:19 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:19 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0x0, 0x20000001}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)) getpid() r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000100)={0x0, 0x70, 0x5, 0x6, 0x100000001, 0x71309b79, 0x0, 0x0, 0x110, 0x7, 0x8, 0x8, 0x40, 0x1, 0xffffffffffffffff, 0x6a, 0xd4d, 0x20, 0x10000, 0x2, 0x4, 0x7ff, 0x4, 0x80000001, 0x9, 0x52, 0xbc0f, 0x5, 0xfffffffffffffffa, 0x3, 0x7, 0x7, 0x8, 0x10000, 0xb321, 0x6, 0x400, 0x7, 0x0, 0x10001, 0x6, @perf_config_ext={0x0, 0x4}, 0x80, 0x0, 0x1, 0xf, 0x5, 0x6, 0x2}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffff9c, 0x0, 0x6, &(0x7f0000000000)='bdev&\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000080)='ip6tnl0\x00') 04:01:19 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x2b, &(0x7f0000000280), 0x706) recvmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000200)=[{&(0x7f0000000080)=""/8, 0x8}, {&(0x7f00000000c0)=""/14, 0xe}, {&(0x7f0000000100)=""/152, 0x98}, {&(0x7f00000001c0)=""/41, 0x29}], 0x4, &(0x7f00000002c0)=""/190, 0xbe}, 0x100) recvmsg$kcm(r0, &(0x7f0000001540)={&(0x7f0000000380)=@generic, 0x80, &(0x7f0000001500)=[{&(0x7f0000000400)=""/10, 0xa}, {&(0x7f0000000440)=""/18, 0x12}, {&(0x7f0000000480)=""/72, 0x48}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x4}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0xfffffffffffffffe, 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000001580)='syz0\x00', 0x200002, 0x0) 04:01:19 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r1, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r2 = socket$kcm(0x29, 0xfffffffffffffffd, 0x0) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000007ac0)={&(0x7f0000007780)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000079c0), 0x0, &(0x7f0000007a00)=""/135, 0x87}, 0x102) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0xa, 0x0, 0x20, 0x4, 0x51, 0xffffffffffffffff, 0x1, [], r3, 0xffffffffffffff9c, 0x3}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r4, &(0x7f0000000200)="f21c", 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000280)='cpB1\x82\x12,\xf8\x18\x11c\x17\v\x95\xdc\xa3\x18b\xbeV\x18\r\xe0Zt\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000580)=0x7, 0x12) r7 = openat$cgroup_ro(r6, &(0x7f0000000400)='io.stat\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000100)={r6}) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xe, 0x6c, &(0x7f0000000b00)=ANY=[@ANYBLOB="7ba8f8c81ba657e37300000000000000f4de26f928ad3035cd88c75cb3ef0892fdff3fe283071a37ce106bb1cf7fc30c9c8bda2ef9cd489ad4750a8e308921078f886c7c1315729b34f8ced91549c4dbcd026ff7cf02901671beee07659cd458ad168e023e97537c91071797507107d3001911145e1f676a080000000000000072c2e72dbb079ee600b4835d6c99d4525ccde1fc9530490804000000cb875c20698066d27d53e1bf6339066bc77548c64428e6bf32b6828d9b5c981e5f4e20ae903650d12c43c182e7458c04b5e113a7170b2d7800000000eb97308b22273dfcfbb18331e4df2fbdac4009df3c90ef194eea212e5f951c75d9fed156a1c4b3c3be788ec3846beba30bb2da91e2bb1566c132b82a02e508a3147afefe5a2dbbd98e35ddbc4bcf2cbb8ae6f9a8bb9d9f3d4000045931220b74c7756de44fc7d6c817e39cf962a05c3dd191bcaf54f5240d4a94abb26ddb6d73acfef71da7a4d866766433dc5ed3d7ebf77dc6a44bab6430d945737fb6a0c3faff05f36a1fb8fd90d9e0238d7d5082e95e437f08efbb14cef872e8975c96721d564b50ba35a590f1856f82c083eb795030906b269539512e51084796546c49843fabc53640900e776b41c2256f2d76d8ce84c66c6739b1f4664f763dd4f0ad6c97457b33d6b9766b1c3aeac6419ff48767117e3f2bb7951bb45c300a923cec8286a40c4efcc56e629207d139681c0cabffb6a4fe57e74343c8306f4d752d49add67e0c611a33ff070000000000002a4a2a1d279536d0cea0714f1374b403609ed964c8a5ef251c7fd92d604d4a9e57eb3fcbe34ac6cb647e54aa5edd89c9ebf85951f1ea8ed53b7725d9dea0af20b0414eb77ee48768427d1ca4d1158bbb0db84bc8be64d839de5a7a499aa3de2f82dcf9409b17dabff986016941fb86b2265cb0d8252072779756db4649003fad7cc1a0026d30e3daf6e85b7711d7ea4d80f7b032a3025d60065d0000000000000000000000000000002580f8f544d4e167b3a0e469bbf5de438cdaabcdebfb2614451181c1760570cb02eeb86a1936be3e243b9c411d1f9aef6f48ee86b55380ffce569e0f9a36a1e14ba319be6d3c4c9ec931cdfd4e42f0dbc05a8ed5fbcbad7ca7da2a9bc867e61c657038bc97d3b2604b5d326031d7a212f983627ec16514df881ccb306f932bd5be08d18ab22f1c51000000000000000000"], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket$kcm(0x29, 0x7, 0x0) r8 = getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffff7, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x800, 0x20000000, @perf_config_ext, 0x1411, 0xc92, 0x3e}, r8, 0x3, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r7, 0x800454d3, &(0x7f00000006c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400), 0x0, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200091}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000440)={r7}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)) 04:01:20 executing program 5: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 383.471283][T10590] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 04:01:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x1ff) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x1ff) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x8000000000003) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x1f00, 0x0, 0x0, 0x0, &(0x7f0000000640)={0x7, 0x1}, 0x0, 0x0, &(0x7f0000000680)={0x3, 0x6, 0x8001}, &(0x7f00000006c0)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0xffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000880)={r2, 0x10, &(0x7f0000000840)={&(0x7f0000000580)=""/160, 0xa0, r4}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0xfffffffffffffff7, 0xf33, 0x0, 0x3, 0x0, 0x1, 0x8, 0x5, 0x800, 0x3, 0x4, 0x441, 0x7ff, 0x8, 0x2, 0x101, 0x8, 0x100, 0xdab, 0x381b, 0x7f, 0x1ff, 0x2, 0x8, 0x2, 0x1, 0x6, 0x8001, 0x7, 0x7fffffff, 0x2, 0xff, 0x10000, 0x5, 0x7fffffff, 0x5, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000480), 0xb}, 0x4, 0x2c08, 0x6, 0x4, 0x10001, 0x0, 0x100000001}, 0xffffffffffffffff, 0x7, r2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="9702e80ebe1f2b7d7e94bd9760e2223501bd1d5dc3526797a6f89d78ce4fe1b80014886257da97846a75b1a7b9eb573db16564022f0575225b3e1364979c7f878c34fcee7a816c47ac420324b6253e737e66c3fb9fe4d9b5b862356061e81baea412b7a298780b0b6d66e441dce269cbe842750b0fc12dda4a563193d2a6d68f48a2587a5d9626d3a886fce742e404c84b85577cb7ba17e338bbbab00ad80dc58a606095d70cff1601808905e636a5c6e2eecbb6bf88ff00000000"], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x4, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4, 0x3, 0x33c, 0xfff, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x20000, 0x7, 0x0, 0x2, 0x9, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r5, &(0x7f0000000200)=0xf5860200, 0x43400) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) r6 = openat$cgroup(r5, &(0x7f0000000440)='\xfd\xffz1\x00', 0x200002, 0x0) socketpair$tipc(0x1e, 0x1000000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={r2, r3, 0x9, 0x3}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0xa, 0x1, 0x3ff, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) recvmsg$kcm(r7, &(0x7f000000ca40)={&(0x7f000000c800)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000c9c0)=[{&(0x7f000000c880)}, {&(0x7f000000c8c0)=""/110, 0x6e}, {&(0x7f000000c940)=""/112, 0x70}], 0x3, &(0x7f000000ca00)=""/33, 0x21}, 0x1) bpf$MAP_CREATE(0x0, &(0x7f000000ca80)={0x1f, 0x1f, 0x7, 0x800, 0x10, r3, 0x263, [], r8, 0xffffffffffffffff, 0x5, 0x4}, 0x3c) openat$cgroup_procs(r6, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 04:01:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='io.stat\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000001600)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r3, r1, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000100)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={r0, 0x2, 0x1, 0x7, &(0x7f0000000200)=[0x0], 0x1}, 0x20) write$cgroup_type(r0, &(0x7f0000000300)='threaded\x00', 0x9) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)=0x100000001, 0x12) 04:01:20 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:20 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) close(r1) sendmsg(r1, &(0x7f0000000540)={&(0x7f0000000280)=@rc={0x1f, {0x8, 0x1, 0xfffffffffffffffb, 0x1, 0x469a, 0xf1}, 0x7f}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000300)="307c468923973f96dcef00d0fd18afc51e2316260161b4d8a0b092ad4e35307c93b682b0ceb25b97841df42cd8555948068ad57b362ed53e6c86aac0f8414bc657cfe7e2b5872578aa3aa99ce55a25", 0x4f}], 0x1, &(0x7f00000003c0)=[{0x68, 0x119, 0x9, "18a7c2ec9d9f281039c0e96b57fb680e75557d9550fbb6a97cafb111e6572360a91dad87c1a1b3ed12671139eb2455cc35a596f6163f1d3cda7c2dd10eec74d40802700d088c8f389a8cfb0954c2ee43713f"}, {0x98, 0x117, 0x8, "3c460131029eea2fea97e57f9e7a50170afd0d6ee25b8317ffa9e145f161ca7dd3efe78225dfd7fd3c94491f983d6f3fe6271f33cab398e673dbedd01572eb1b96739c446b20cb3ce48d27205f92d776d3a942fbcdbbe4398f02b988238372aed939117a7baa1ef7f4cfab1d355ff5e705bb98f0d9fb86f9f12d8b4bfe61135205029c"}, {0x50, 0x1ff, 0x5, "a981fb33c5bc18ef17526f0c5d2612e6180c1b4a379adf4bc2f39894f1e4c0abb1298ca0cf0adfbd4d6bc86e8b6c819ee66714604a074ad65977e00aaef5"}], 0x150}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0x65a0c548) recvmsg(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x6e}], 0x1}, 0x3f00) 04:01:20 executing program 5: recvmsg$kcm(0xffffffffffffff9c, 0x0, 0x40012142) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e8fe55a1bc000500ac14140103000000050000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) 04:01:20 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 383.833411][T10611] validate_nla: 5 callbacks suppressed [ 383.833631][T10611] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 04:01:20 executing program 5: recvmsg$kcm(0xffffffffffffff9c, 0x0, 0x40012142) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e8fe55a1bc000500ac14140103000000050000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) 04:01:20 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 383.999710][T10619] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 04:01:20 executing program 5: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:20 executing program 0: r0 = socket$kcm(0x10, 0x2000400000000000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r1, 0xc0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x7, 0x5}, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x2, 0x5, 0x7ff}, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0xfffffffffffff207}}, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="d800000018008105e00f80ecdb4cb9040a1965000b007c05e87c55a11200e1730000000000050000000000000000812fa80005001b4163e3e53db14ca0508ac1799d58f030035c3b61c1d67f6faf7d7134cf6efbe06bbace8017cbec4c2ee5a7cef4c02631631fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6dd457c0b03c10964c360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace80ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703db0de796ac5abeb3a79dd14678", 0xd8}], 0x1}, 0x0) 04:01:20 executing program 4: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:20 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:21 executing program 1: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:21 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x6) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') 04:01:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='/\x02ro\x05\x00\x00\x00tap\x00\x89PY7/\x91\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1\xf8\x1d\xb6,\xc99\x96h\xf3\x01\xb3f\x8a\xd0+G\xddC\x9d\xcfE?\x1b\xce\xff;OZ\'E\xf5', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='[dma.current\x00\xf9\xde\xadk\x11U\xfa\x15\xec\xf1\xf8>,\xcfM\x93\xd4I\x8d\xc0\xc0 \x00\xa3|\xf6\xfaP\xb3\xbb\xb1\x18\x95\x00\x95e\x02K\x1b\xff\xe7[\x15\xc6JCI;\xe4I\x05)\xd5f\x832H\'9e%\x13_\x02\xac\r\a\xd0\xad*\xe8\xdah\xe7`\xa3u\xe0\xb7O^\xf9\xbf\xb5\x17(\x8a~\xdf\xb3\xee\xb8m\x8a=D\xb7\x82%\xa3\xad\xf5\x8c\xb8\xf4\xca\xa6\x1c\xae\xcb!U\x0f\xdb\xee\x8b\x11\xffy\xa3\xb7&\x80r\xdb\xdb\xc4\x9c\x83\x11\x91\xfcy\xd5OO3\x80\xd7\xfc\xe6}X]\xeaO\xfd\x8e\x0e\xbe\xce', 0x26e1, 0x0) close(r0) close(r1) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="18000000000000000100000001000000ec00000004"], 0x15}, 0x0) r2 = socket$kcm(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'veth0_to_bridge\x00', @dev={[], 0x11}}) sendmsg$kcm(r2, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[{0x18, 0x1, 0x1, "ec"}], 0x18}, 0x0) recvmsg$kcm(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=""/134, 0x86}, 0x0) 04:01:21 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x20001, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000080)) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)=0x3, 0x4) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x4, 0x4, 0x7f, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x200, 0x0, 0x4, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x2) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) 04:01:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x79c763511b7f13f1) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f000000cfc0)={&(0x7f000000ce00)=@can={0x1d, 0x0}, 0x80, &(0x7f000000cf80)=[{&(0x7f000000ce80)=""/123, 0x7b}, {&(0x7f000000cf00)=""/99, 0x63}], 0x2}, 0xb2d6931f4e340962) bpf$MAP_CREATE(0x0, &(0x7f000000d000)={0x1f, 0x6, 0x80000000, 0x4, 0x8, r0, 0x9b, [], r2, r0, 0x4, 0x2}, 0x3c) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\x85', 0x241, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='.\xdemec\xa3\\/cgr\t\x00\x00\x00net//yz\b\x00\r\xcdq\x8f\x8d\xfeH.\x857\x87U\x8a\x06@k.F\x13\x94\xcf\x9f\x01K\xc6\x80\xbay\xc1V\xe8\xe3Z\x90\xdb\xfc\r\xa0\xec\x143\xee\xfe\xe5\x1e\xd3\xf2\xa1I\xf1&\xe2\xb1\xceK\xc7)\xa5\xc9\x9f\xc4\x88Fz\xbf\x95\x1b\x01~\xc3]\xf08\x8f\x1be\x1b\xa6\xdd\xa5<\xc5\xfc\x00\xcb\xd6\xb0\xa1\xf3e\xea!\"\xc3\xb5Y\x98\xa1\xe5u\x9b\x12\xa5\xb6\xf2!F\xee', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNGETFILTER(r4, 0x801054db, 0x0) r5 = openat$cgroup(r1, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'yam0\x00'}) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000040)) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r5, r0, 0x9, 0x3}, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x1) write$cgroup_int(r4, &(0x7f0000000140), 0xf) 04:01:21 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:21 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x28, &(0x7f0000000080)}, 0x10) socket$kcm(0x2b, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={r0, r1, 0xf}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbc, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0xfbfffffffffffffc, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r2 = socket$kcm(0xa, 0x400000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x8980, &(0x7f0000000000)) 04:01:21 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) recvmsg(r0, &(0x7f0000000200)={&(0x7f00000000c0)=@pppoe, 0x80, &(0x7f0000000140)=[{&(0x7f0000000000)=""/21, 0x15}], 0x1}, 0x1) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1f, 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="00980200100000008e5b1dad5749daeb164399d1c72f41624e0b146604960ff27002559bfd790728293b5af3afbcccc3c58cf6f04e61636cdd18a8516582a906b40a73280fea0a4d074a6053f4fe07dbe777cdeb2097149cd8d5ad1e6e630f8d4cfaab2433c30afdeea918b4648800db2ea34096084b043b882f76df91e937238ba94b8407e205aa67b2c41c139025487f326e2bce2adaf58867310933fc9bb20010e590b5f8e7d405c1c3c5f04e3a06c32b261f3f38f43dd35138910e6bf95535867d614dba300c168c52f6b080e7f01d6bfec43a78fad62e9fc5d12fd66dba6786877e72d77415bfd4aa"], &(0x7f00000002c0)='GPL\x00', 0x3, 0x0, &(0x7f0000000300), 0x41000, 0x3, [], 0x0, 0x4, 0xffffffffffffff9c, 0x8, &(0x7f0000000340)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0xe, 0x4, 0x29}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r2, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000480)={0x9, 0x2}, 0x0, 0x0, &(0x7f00000004c0)={0x1, 0x4, 0x3, 0xfff}, &(0x7f0000000500)=0xffffffff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x2}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 384.925642][T10656] device nr0 entered promiscuous mode 04:01:21 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x28, &(0x7f0000000080)}, 0x10) socket$kcm(0x2b, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={r0, r1, 0xf}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbc, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0xfbfffffffffffffc, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r2 = socket$kcm(0xa, 0x400000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x8980, &(0x7f0000000000)) 04:01:21 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:21 executing program 0: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:21 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:22 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x20001, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000080)) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)=0x3, 0x4) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x4, 0x4, 0x7f, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x200, 0x0, 0x4, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x2) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) 04:01:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x31, &(0x7f0000000440), 0x4) r1 = socket$kcm(0x2b, 0xfefffffffffffffe, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2d, &(0x7f00000000c0), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:01:22 executing program 0: r0 = socket$kcm(0xa, 0x4, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @dev, 0x9}, 0x80, 0x0}, 0x200008c4) recvmsg$kcm(r0, &(0x7f0000005bc0)={0x0, 0x0, &(0x7f0000005b40)=[{0x0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) r1 = socket$kcm(0x2b, 0x4000000000000001, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f00000000c0)=@rc={0x1f, {0x1f, 0x6e13, 0x20, 0x2a, 0x0, 0x5}, 0xfffffffffffffff7}, 0x80, &(0x7f0000000180)=[{&(0x7f00000002c0)="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", 0x1000}, {&(0x7f0000000140)="c188236e6aeb9010d352c6742d74881c35ebc410fa09b15548b6ca27f009ac605ba48c15a07080c867805220ecd601229f612279d0f9428a2141", 0x3a}], 0x2, &(0x7f00000012c0)=ANY=[@ANYBLOB="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"], 0x2c0}, 0x4) recvmsg$kcm(r0, &(0x7f0000001700)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f00000016c0)=[{&(0x7f0000001580)=""/245, 0xf5}, {&(0x7f0000001680)=""/4, 0x4}], 0x2}, 0x10002) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) 04:01:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb, 0x20, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x7, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000004c0), 0x4) r2 = socket$kcm(0x2, 0x7, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000380)=r3, 0x4) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r4, 0x0) r5 = socket$kcm(0xa, 0x100000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) sendmsg$kcm(r5, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0, 0x263}, 0x200008c4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r4, 0x400454d8, &(0x7f0000000300)=0x3) close(r6) r7 = socket$kcm(0x10, 0x3, 0x10) socket$kcm(0x29, 0x7, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r3, 0x4) sendmsg$kcm(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x8) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) recvmsg(r8, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) recvmsg(r8, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r8, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) 04:01:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x17, 0xf, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x16}, @initr0={0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, @jmp={0x5, 0x8000, 0xb, 0xf, 0xe, 0x0, 0x8}, @generic={0x5, 0x1, 0x20000000000, 0x4, 0xa3}, @map={0x18, 0xa}, @exit, @jmp={0x5, 0x80000000, 0x9, 0x0, 0x3, 0x0, 0x4}, @alu={0x7, 0x0, 0xf, 0xf, 0xf, 0xc, 0x1}, @map={0x18, 0x3, 0x1, 0x0, 0x1}]}, &(0x7f0000000280)='GPL\x00', 0x2, 0xd0, &(0x7f0000000440)=""/208, 0x41000, 0x0, [], 0x0, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000000540)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x1, 0xe, 0x8, 0x6}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x0, 0x66, 0x87, &(0x7f0000000640)="28526be17c48fa86055e2792d8bf0fc579bcb8fd559356cdd64a4ed78c05f51bd46b0a5bebd5128f4f6afc52fcf399141ddb71019207939a133b3961e5ca8f26a4a32800e86a0fc553c8597c29c4cff644209fff768cda92cf0348e769917945a6449b9e9f31", &(0x7f00000006c0)=""/135, 0x7fffffff}, 0x28) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xeca60000, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f00000000c0)=@hci, 0x24, &(0x7f0000000140)}, 0x0) 04:01:22 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:22 executing program 0: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xe218}], 0x1}, 0x0) r2 = socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) sendmsg$inet(r2, &(0x7f0000000700)={&(0x7f0000000480)={0x2, 0x4e21, @rand_addr=0xffff}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000580)="e06a95b35bf08b03afb3275bf3478a9907b1b7e985e1c2167c1ab954f6bb9e1d84518996eebc048bbb54bf417cc45a6f406a72ae6f049c7df407", 0x3a}], 0x1}, 0x5da257ceb8ae5e15) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={0x0}, 0x10) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x20) openat$cgroup(r2, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xfffffffffffffc29, 0xab, 0x0, &(0x7f0000000280)=""/175}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x40000, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, r4, 0x0, 0x2, &(0x7f0000000140)='}\x00'}, 0x30) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x80000001, 0x80000000, 0x5, 0x8, 0x0, 0x0, 0x301, 0x6, 0x2, 0xf38, 0x1, 0x2, 0x2, 0xef5d, 0x7f, 0x4, 0x7f, 0x80, 0x3, 0x9, 0x800, 0x100, 0x6, 0x9, 0x3, 0x6, 0x7, 0x40, 0xffffffffffffffff, 0xfffffffffffffffb, 0x6c8, 0x6f, 0x60de, 0x3, 0x0, 0x8, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x1000, 0x5, 0x3f, 0xf, 0x10000000, 0x4, 0x2}, r7, 0xd, 0xffffffffffffffff, 0x8) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000280)={'veth0_to_bridge\x00', 0x5fc}) r8 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r3) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000380)) recvmsg(r8, &(0x7f000000a000)={&(0x7f0000008c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000009f40)=[{&(0x7f0000008cc0)=""/99, 0x63}, {&(0x7f0000008d40)=""/207, 0xcf}, {&(0x7f0000008e40)=""/27, 0x1b}, {&(0x7f0000008e80)=""/4096, 0x1000}, {&(0x7f0000009e80)=""/148, 0x94}], 0x5, &(0x7f0000000380)}, 0x40) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f000000a040)=r9) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r5, &(0x7f0000000000), 0x20000200) 04:01:22 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000780)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000dc0)={&(0x7f00000007c0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000c40)="248bd4a891e2678e9096d46c43d6e78e51093e5fbd414f8621fe831d1c33cadf00fa4b2f608c8480f1c4a183c0bdba31fc380c9f84a7ceb095d0cc2072f5f54e1a33d4fd15ab1b945508e5c8078783e36635ffbf1499caceb01e0afb14d971414345b89df366174db514a3347571e7f408a2bb1fe64c106bb9cd1a8c21e474ced27a9179a399dea552d26c097fd6a4b51e8d5855131a165843be456dc37499bf407e08043639", 0xa6}], 0x1}, 0x8800) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0xffffffffffffff15) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$kcm(0x10, 0x400000003, 0x10) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2e0000002b00cbed8298e08700000000120f0000000000bc4cc92f0580cb5623072a006d1c958c00000000000000", 0x2e}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) 04:01:22 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 385.957472][T10723] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:01:22 executing program 4: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 386.237846][T10727] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 04:01:23 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 386.321986][T10723] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:01:23 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000780)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000dc0)={&(0x7f00000007c0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000c40)="248bd4a891e2678e9096d46c43d6e78e51093e5fbd414f8621fe831d1c33cadf00fa4b2f608c8480f1c4a183c0bdba31fc380c9f84a7ceb095d0cc2072f5f54e1a33d4fd15ab1b945508e5c8078783e36635ffbf1499caceb01e0afb14d971414345b89df366174db514a3347571e7f408a2bb1fe64c106bb9cd1a8c21e474ced27a9179a399dea552d26c097fd6a4b51e8d5855131a165843be456dc37499bf407e08043639", 0xa6}], 0x1}, 0x8800) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0xffffffffffffff15) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$kcm(0x10, 0x400000003, 0x10) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2e0000002b00cbed8298e08700000000120f0000000000bc4cc92f0580cb5623072a006d1c958c00000000000000", 0x2e}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) 04:01:23 executing program 0: r0 = socket$kcm(0x10, 0x7, 0x10) r1 = perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x28) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x7, 0x70, 0x8, 0x2, 0x800, 0x5, 0x0, 0x2, 0x420, 0xa, 0x7028, 0x3, 0x8e, 0x8f, 0x5, 0x7, 0x6, 0x0, 0x80000000, 0xca, 0x9, 0x4, 0x1000000000, 0x8, 0x6, 0x100000000, 0x400, 0x4, 0x8, 0x3, 0x9, 0x1f, 0xfff, 0x8, 0x556678b6, 0xfa, 0x7, 0x6, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x20400, 0x6, 0x2, 0x9, 0xa34e, 0x8, 0xc690}, r2, 0x2, r1, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)='ip6tnl0\x00') 04:01:23 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0xba, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x55, 0xa}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x35}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x82, 0xc2, &(0x7f0000000240)="0b83a36a41d0e0b138ded5b1d80e5fe19aac62a6959217437c283974ec7a621587e30d1d4c4a48804a30298fdde5b49d210b5cc62e24f9c0e491c9cb7693e3aa0fb0951e7062aeb630f140d8ed6d61a122eb4911a30360b1d6c910968d02450479865132af983039eceb9b02480c4da7d8b4cc8423c88b7caee78e802db512d67019", &(0x7f0000000300)=""/194, 0x10}, 0x28) 04:01:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb, 0x20, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x7, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000004c0), 0x4) r2 = socket$kcm(0x2, 0x7, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000380)=r3, 0x4) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r4, 0x0) r5 = socket$kcm(0xa, 0x100000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) sendmsg$kcm(r5, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0, 0x263}, 0x200008c4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)=""/25, 0x19}, 0x40) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r4, 0x400454d8, &(0x7f0000000300)=0x3) close(r6) r7 = socket$kcm(0x10, 0x3, 0x10) socket$kcm(0x29, 0x7, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r3, 0x4) sendmsg$kcm(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x8) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) recvmsg(r8, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) recvmsg(r8, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r8, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) 04:01:23 executing program 1: r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) setsockopt$sock_attach_bpf(r0, 0x1, 0x5, &(0x7f0000000180)=r1, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='/dev/net/tun\x00', r1}, 0x10) sendmsg$kcm(r0, &(0x7f00000015c0)={&(0x7f0000000000)=@in={0x2, 0x4e22, @empty}, 0x80, 0x0}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x200800, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000380)='syz0\x00', 0x1ff) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000300)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000140)=r5) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_subtree(r4, &(0x7f00000003c0)='cgroup.subtree_control\x00', 0x2, 0x0) 04:01:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x404800, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30f) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000100)=0x8) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xeca60000, 0xffffff7f01030000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x73}, 0x0) [ 386.615309][T10753] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 04:01:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000300)="2e000000180081f8001080ecdb4cb9040a005f510b0000072b51da1b40d819aa0000000000000000001000000000", 0x2e}], 0x1}, 0xfffffffffffffff9) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0x4) recvmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000200)=""/96, 0x60}], 0x1}, 0x100) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000140)={r1, r2}) 04:01:23 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='s\x00\x00kaller\b', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x5, 0x0, 0x2}, 0x10}, 0x70) 04:01:23 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:23 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x11, &(0x7f0000000040)=r0, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) [ 386.954167][T10775] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:01:23 executing program 5: r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0xfdfffffffffffffd) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) 04:01:23 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x404800, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30f) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000100)=0x8) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xeca60000, 0xffffff7f01030000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x73}, 0x0) 04:01:23 executing program 1: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:24 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:24 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='pids.current\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000140)=0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.stat\x00', 0x0, 0x0) sendmsg$tipc(r2, 0x0, 0x20000000) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002c008151e00f80ecdb4cb904014865160b0001410180ffff000000110e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) 04:01:24 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x8916, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\x00;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddpr\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x5c8, 'memory'}]}, 0xfdef) close(r0) ioctl$TUNSETCARRIER(r3, 0x400454e2, &(0x7f0000000040)=0x1) sendmsg(r2, &(0x7f0000000400)={&(0x7f0000000300)=@l2={0x1f, 0x8, {0x0, 0xfffffffffffff1ab, 0xffffffff80000001, 0x6, 0xfffffffffffffff8, 0xec}, 0x9, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000005c0)="c788a143be588b1cbbebbe149011978d1bc3affbf66c6963ba4867ed48a454a49580545a740177d9ae076583515e08f904432b41c8c9ec6bda33b72639efbeb59234f2f37c913f2094add30ce8aff93c690ac5b761ae5e15e31c40c26de0ec76b0aad76c28a47284ec2b3f5a1dee3b9aa9e0b89efccdf3fc76f2f955da49a1367db1efcdab2d5a9a883e7fd79c0c229351865ca6fcda643451e2f0892fecc85c5aa54feca372629f2f0943b20125f183f4b357e1a58eb45dcc683ac181a0aaea27cec1d9f882dd2cacb3e6bcc1d71ec04f2d642c22458a5b9085e9d91a1e333ec0e72d9121fed59bd40e777537e0e4a3c9", 0xf1}], 0x1, &(0x7f00000006c0)=[{0x60, 0x139, 0x6, "7637c4e0f4487263f896344df922113030ebd73d64b097de11f14a15827a6edc081a2de18032a8f668d2eaafe9475cfe0eb32b3effa6f5ead73ac763325029debfef818ce2f3215f08b976ebf4"}, {0xf0, 0x111, 0x80, "9d3cca2f894b428627c8d063dbc0d20482ec50fac14a403e87e72764f80530ff5d87cbd945d3ab464daec6b98208edee83969587f335b7214dbcbbebf9c6287b6a5ea3596ae6138ef37645955fa7e1dabc8d51580151e02f520475a65755e4172811dea337ab389ca3f715b5a57f6becf85d93e97f4d62f367e14e4d872ebe4cc7736628614ae15b2606ac09eefe1324dcf2dc82f8b600e4532578a1564c63968c8998099242bf3b9b1162fffe3d90b266eb428c18597aea3153e635024611830d2b1ee910f75383c43d138728f3a3792491fc421ae07dd1de03745f535558"}, {0x88, 0x10a, 0x200, "dc88a9fb67e13bc174fd49985ed0295a3e8563a74c85c8302b681ae63e96fe7bfffbbbbe76d59eb1cddcc61767063522bf3ccc3e7a1a6c7034f44e65dfc092e15b28dcd2b33865e0d92ae13fd7ef718e778fa5ede320a5aad08546a8c8eb1441384d2b195ad64e77465253a6501d53abd7f3"}], 0x1d8}, 0x40080) close(0xffffffffffffffff) recvmsg$kcm(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=""/134, 0x86}, 0x0) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 04:01:24 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r1, 0x0, 0x3d, &(0x7f0000000000)='selinuxtrusted*em1vboxnet1*cgroup(;^)\\GPL&,mime_typevboxnet0\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(0x0, r2, 0xb, r0, 0x0) socketpair(0x1d, 0x3, 0x1, &(0x7f0000000240)) unlink(0x0) socket$kcm(0x29, 0x0, 0x0) 04:01:24 executing program 4: perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xb000) perf_event_open(&(0x7f0000000180)={0x1, 0x339, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xed21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000080)={r2}) socket$kcm(0x11, 0x3, 0x300) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09f"}, 0x20) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup(r0, &(0x7f0000000340), 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) openat$cgroup(r4, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(0x0, r4, 0x0, r4, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNGETSNDBUF(r4, 0x800454d3, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000240)={0xffffffffffffffff, r4}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="de6386dd07"], 0x90ad) write$cgroup_pid(r1, &(0x7f0000000000), 0xcbaa60f5) 04:01:24 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 387.742421][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 387.748369][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 387.844965][T10814] Started in network mode [ 387.870134][T10814] Own node identity e000600, cluster identity 4711 [ 387.894969][T10814] 32-bit node address hash set to e000600 04:01:24 executing program 3: socket$kcm(0x29, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:01:24 executing program 0: [ 388.222386][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 388.228295][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 388.241939][T10832] device nr0 entered promiscuous mode 04:01:24 executing program 5: 04:01:24 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:24 executing program 1: 04:01:24 executing program 0: 04:01:25 executing program 0: 04:01:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008100e00f80ecdb4cb90402c865160b000000d4126efb120001000e00da1b40d819a906001500f0ff", 0x2e}], 0x1}, 0x0) 04:01:25 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x90}]}, 0x0, 0x1, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 388.889537][T10858] device nr0 entered promiscuous mode 04:01:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) 04:01:25 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='pids.current\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000140)=0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.stat\x00', 0x0, 0x0) sendmsg$tipc(r2, 0x0, 0x20000000) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002c008151e00f80ecdb4cb904014865160b0001410180ffff000000110e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) 04:01:25 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f0000000040)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000300)='gre0\x00') openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000300)='gre0\x00') 04:01:25 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:25 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x200, 0x4, 0x20000000001009}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000040)}, 0x10) 04:01:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) 04:01:26 executing program 3: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 389.360115][T10875] Started in network mode 04:01:26 executing program 1: r0 = perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0xffffffffffffffe5) r1 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4520cecff0e00fa078b5bdb4cb904e473730e55cff26d1b0e001d80020000005e510befccd7", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000000)={r1}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x7) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 04:01:26 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:26 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x33f) r2 = getpid() r3 = perf_event_open(0x0, r2, 0x0, r0, 0x80000000001) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9b, 0x80000001, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) bpf$MAP_CREATE(0xa, &(0x7f0000000080), 0x3c) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00\xb9\xe9\x9c\xa8I@P\xfeHS~\x81\xb4\xa8\n\xd1-', 0x26e1, 0x0) openat$cgroup(r5, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x5, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f0000000180)}, 0x20) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x401c5820, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) recvmsg$kcm(r4, &(0x7f000000a640)={&(0x7f0000009400)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000a540)=[{&(0x7f0000009480)=""/4096, 0x1000}, {&(0x7f000000a480)=""/137, 0x89}], 0x2, &(0x7f000000a580)=""/168, 0xa8}, 0x10121) bpf$MAP_CREATE(0x0, &(0x7f000000a680)={0x8, 0x200, 0x7, 0x0, 0x42, 0xffffffffffffff9c, 0x3, [], r8, r6, 0x5}, 0x3c) [ 389.388019][T10875] Own node identity e000600, cluster identity 4711 [ 389.419356][T10875] 32-bit node address hash set to e000600 04:01:26 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r2, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) recvmsg(r2, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{0x0}, {0x0}, {&(0x7f0000000540)=""/194, 0xc2}, {&(0x7f0000000140)}, {&(0x7f00000002c0)=""/6, 0x6}, {0x0}], 0x6}, 0xf4ad1e69669fbe32) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000040)=r0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg(r2, 0x0, 0x0) r4 = socket$kcm(0x11, 0x6, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) openat$cgroup_ro(r3, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01001800007f1836c390000000004a8fc4de5415d00bf205a54b818b69d31a7c811c2f08e4ca975b6f5e7351fde14086b34e18ef779f9a532ff1c3a0d790ca43e7f8"], 0x0, 0x44}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r4, r1, 0x0, 0x3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89a2, 0x0) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000140)='tasks\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 04:01:26 executing program 4: perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x81, 0x9, 0x1ff, 0xff0b, 0x0, 0x3924, 0x40000, 0x0, 0x250b, 0x4, 0x41, 0xfff, 0x404000000000, 0x101, 0x0, 0xfffffffffffffff8, 0x16, 0x101, 0x400, 0x3, 0x80000000, 0x7138, 0x7, 0x0, 0x7f, 0x101, 0x401, 0x1, 0x2, 0x40, 0x6, 0x9, 0x6, 0xffff, 0xe7, 0xffffffff, 0x0, 0x9, 0x0, @perf_bp, 0x100, 0x3, 0x4, 0x0, 0xffffffffffffff1c, 0x8000, 0x2}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x200000000000f, 0x100000000000003, 0x2, &(0x7f00000000c0)) [ 389.639202][T10890] netlink: 'syz-executor.1': attribute type 29 has an invalid length. 04:01:26 executing program 3: socketpair(0x0, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x400000003, 0x10) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000040)="2e0000002b008163e45ae08700000000160f0000000000bc4cc91b4dffbe45b7c4d65b2f0580cb7023072a556d1c", 0x2e}], 0x1}, 0x0) [ 389.701863][T10895] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 389.724138][T10890] netlink: 'syz-executor.1': attribute type 29 has an invalid length. 04:01:26 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 389.784318][T10896] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 389.810316][T10904] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 389.834603][T10896] netlink: 'syz-executor.1': attribute type 29 has an invalid length. 04:01:26 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=ANY=[@ANYBLOB="1000afbfacf30930000000f68e00000000000500106eb35976533c989b1e39eb199ad7ae0414c7db0b299b65b9eb949c7a17d92dd90eb691c9607f25bdbc4105ba94782222539c60c970acaa7b73ed3f6a6cd2d8c12c8a5fd01bd27e063a8e08647ea3bbc5fd587217acf874b9af57f70dc7d726e2607e35fde9509c647dba8baca85f6b3da56c08d3cee42e15d52198426f55d1209345b65343e07c1c3ba7f4b07772969f7d0e845dc163128bbafcf1a0d10fffcf16b06528d3d8e24a422c50e15bdaee6c70cb5a748d6acbff3e44000cf05ceb73f35ca56b249c7c2fa403100a6762e08a601b1d34686ec8eab8cb83be428c8b626275628e5b0c2d7033ee4877be126c4d25e719ba5d2eb13d303ccff5b52e1a7a8d8d409c197ae89e9fe1b6f0860c3bda485c574f908d04d5a876f753212ca2fa9c4feca08b23ff3bbfc44b4b7b0751e88daf178eb60a6aae83ec0b833548ae7d72f37e62c4557c0ecf8d438832e8a2131a727f923eb66a7a3cd86ca5cb8be4b7fd26a7ed9891d52163a80c948473cb2197bfe4ab704e192afebf413c3ddeb26f0c2cb737c9c59ad722ffb58ecef888b9e1"], 0x10}, 0x20000000) r1 = socket$kcm(0xa, 0x522000000003, 0x11) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000280)=""/4096) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) getpid() perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x2, 0x7, 0xfffffffffffff800, 0x1, 0x0, 0x5, 0x0, 0x8, 0x9, 0x0, 0x800, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3ff, 0xfffffffffffffffc, 0x6, 0x400, 0x401, 0x0, 0x9, 0x0, 0x4, 0x0, 0x7, 0x7f, 0x1, 0xb9, 0x9, 0x0, 0x2, 0x0, 0x0, 0x8, 0x0, 0x9, 0x1, @perf_config_ext={0x401}, 0x2000, 0x9, 0x2, 0x4, 0x7, 0xfffffffffffffffa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xeca60000, 0xffffff7f01030000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x73}, 0x0) 04:01:26 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\xff', 0x241, 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0x6d00c) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, r1, 0xa, 0x1}, 0x14) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cgroup.events\x00', 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000340)=r3, 0x4) r4 = perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x8d, 0x3, 0x6, 0x0, 0x0, 0x6, 0x0, 0xb, 0x0, 0x0, 0x9, 0x0, 0x2, 0x4, 0x4800000000, 0x0, 0x0, 0x6, 0x101, 0x0, 0x0, 0x0, 0xc9f5, 0x7f, 0x1, 0x6, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe, 0x0, 0xa79, 0x4, 0x432b, 0x3e, 0x0, 0x0, 0x1, 0x3, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x69b3}, 0x0, 0x0, r0, 0x1) gettid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) socketpair(0x8, 0x805, 0x80000001, &(0x7f0000000140)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r3, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x401, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x4, 0x2}, 0x0, 0x0, &(0x7f00000002c0)={0x4, 0x8, 0xc4e, 0x4}, &(0x7f0000000380)=0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x3c}}, 0x10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 04:01:26 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000140)={[{0x2b, 'rdma'}, {0x2d, 'rdma'}, {0x2f, 'rdma'}, {0x2d, 'cpu'}, {0x2d, 'io'}]}, 0x1b) socket$kcm(0x2, 0x1000000000000805, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2bfaffffff20"], 0x6) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2d, 'pids'}]}, 0x6) 04:01:26 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:26 executing program 1: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:26 executing program 4: close(0xffffffffffffffff) socket$kcm(0x2, 0x0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) 04:01:27 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={'nr0\x01\x00', 0x4005}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000140)='nr0\x01:\xf2%\xa3\'>\xf8]\x81\x10?\xfa\x02\x00UM\xbf\x03\xaa\xac\x11x\xf4D3A}\xda\xac\xff\x82\x8a\xc7J\xe2J?\x00\x8b\x9c[\xdd\x06\xa4\nCRQ\xb5u\xe0[\x91\xb4H\xecr\xb64%\xb4\xcc1\x95\xd6F\xdd\xa6\xf5\xeb\x97\xa2\xa1s9y\x03\xe7\xb8\xadU\xa3\x11\x8e\xe0\xa0\x16K\x8e\xdd\xcd\xab\xe0*9\xfc\xc0\xfc~\xca\xba\x90\x97&\x9b5\x9d\xb9\xde\x96L\a\xb3\xc7\xd1FL\xa5W\x1cS\x1a\x17\xb7;\xf4\xe5\tW\x05&PZP\xa3\xb3\xe7\xf8\xd4\x16|\x12\x14\xacC\xffkR(s\xcfO?\xbc\xba\xdb\xcc\x9e\xac\x86\xd6\x1f\x8d\x86\x94J\xf7\xe9q\xfbo!H\xf9\xfb\xf8~j3\xa4\xb3\x8c\xf1\xa4\xbc\xc3%\xe4\xfe\xa17\xf8QN\xcf\xf9z\xaa\x023') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\x03\xaa\xac\x11x\xf4D3A}\xda\xac\xff\x82\x8a\xc7J\xe2J?\x00\x8b\x9c[\xdd\x06\xa4\n') 04:01:27 executing program 5: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x7, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000400)={0x3, 0x3, 0x2, 0x100000001}, &(0x7f0000000440)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x1d21}}, 0x10) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r2 = gettid() perf_event_open(&(0x7f00000005c0)={0x3, 0x70, 0xa8, 0x4, 0x24d7, 0x5295, 0x0, 0x4, 0x40, 0x1, 0x0, 0xef1e, 0x5, 0x7ff, 0x3, 0x8, 0x6, 0x8, 0x2000000000000000, 0xd, 0x4, 0xfffffffffffffff9, 0xffffffff, 0xfffffffffffffffe, 0x59, 0x4, 0xc6c7, 0x9, 0x7bf, 0x100000001, 0xff, 0x5, 0x46, 0xf5, 0x23fc7919, 0x8, 0x3, 0x3f, 0x0, 0x5ae, 0x2, @perf_config_ext={0x1, 0x1}, 0x800, 0xffffffffffffffff, 0x149, 0x5, 0x3, 0xc8a, 0x51d3}, r2, 0xf, 0xffffffffffffff9c, 0x3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000180)="ebdb931a3c7962a29bebf64d2b5faed40001befdc59c62", &(0x7f00000001c0)="f091858fa782c6c59403", 0x3}, 0x20) r3 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r3, 0x29, 0x21, &(0x7f0000000c40), 0x4) sendmsg$kcm(r3, &(0x7f0000000040)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x2, @loopback={0x0, 0x42}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000100)="fa", 0x1}], 0x1}, 0x40) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)={r3, r4}) 04:01:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x1b, &(0x7f0000000040)=r4, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) sendmsg$kcm(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="76e2d061a5f4d389bfb97f6e9952f50b188bb5c0a5f980d67876897727b16063f4ad15", 0x23}], 0x1}, 0x90) close(r4) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, 0x0) mkdir(0x0, 0xfffff7fffffffffc) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) close(r0) recvmsg$kcm(r3, &(0x7f00000126c0)={&(0x7f0000011140)=@hci, 0x80, &(0x7f0000011640)=[{0x0}, {&(0x7f0000011340)=""/96, 0x60}, {&(0x7f00000113c0)=""/156, 0x9c}, {0x0}, {&(0x7f0000011500)=""/129, 0x81}, {&(0x7f00000115c0)=""/126, 0x7e}], 0x6, &(0x7f00000116c0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r3, 0x0, [], 0x0, r5, 0x8}, 0x3c) socket$kcm(0x10, 0x0, 0x4) 04:01:27 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:27 executing program 1: r0 = getpid() r1 = perf_event_open(0x0, r0, 0x2, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = socket$kcm(0xa, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={&(0x7f0000001580)=@in6={0xa, 0x0, 0x0, @dev, 0x1}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001740)="8e5355c4d9be98b6201c8b82908c0c32d360f5e30e", 0x15}], 0x1}, 0x20008844) r5 = socket$kcm(0x2, 0x1000000000000801, 0x84) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) sendmsg$kcm(r5, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) sendmsg$kcm(r5, &(0x7f0000000880)={&(0x7f0000000500)=@nfc={0x27, 0x1, 0x0, 0x2}, 0x80, &(0x7f0000000680)=[{&(0x7f00000005c0)="c14c20a97cd63ab5f057d6b94c178b7c9a029b1eb58b21d8c3fffd83f96527ad86c294bf4c071d5e8bdbfd677c2d508e5d9ba2faadd91cb87501f64dce475949433d42db51e43a8a1b6970a81abdc43d09cbf8e11d7132536216723c0460f57b84d7baba1e6c194787f226938d5384f87f2b5957fa0e227557366b6ba3c2e25c30ee5f646098cc0cef7065da782ebfc5dda03bcf3805429809f747bf2e5864ce8b49", 0xa2}], 0x1, &(0x7f0000000740)=[{0xa0, 0x10f, 0x3ff, "635f068baee4342b5045530b146712992c0fddc0a86dd9338f5e7f3506b180712f4ca3da74bdc49de5d0512512ce3d9f3b9c73864ab9068b2725d1b55ef36dc47ec849d20e597c4b982d67b1b99151ba88fc6fd9db59a2cae3f35f9994ba053e725fe24c2062fb4967a51e50c636830539168750a827b945fee348d92291888422264dac61132119d477"}, {0x28, 0x0, 0x7fff, "7d783c3fb7d2936e2ab651c39d9cc56a2f"}, {0x70, 0x107, 0x4, "24f67c44c81b1974a3ff80e18319d83dee0a6d9589154ca3f8116e97e4d395e4afc4504025087c49ee08e625dc93d5aa70d78cd2e82cc75b47950d39936e3f69ad167ac3c27c5514c98fcd761e1f40730ef591f09a5c19f724e0e4aa60a953e1"}], 0x138}, 0x8000) perf_event_open(0x0, 0x0, 0x0, r3, 0x8) r7 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r6, &(0x7f0000000480)={&(0x7f00000000c0)={0x2, 0x4e21, @rand_addr=0x40}, 0x10, &(0x7f0000000440)=[{&(0x7f0000000240)="7db7f1b35b0af8ec276de236028149ab0b4c68132ef2c46acaecf607d14781e8f160591283832862fdab1a7559a064fe70257335ef2a662dd2113feb9d007f333fcc4b05b4f69f5a673e7d3678e6d408ed3a32cdd50a451bfd7d258a2c166e82d6b963ac529c88c6e8c74f5735f36f2062033f6f7534e3ed57201d3cab64ee74be1f5aced1bc8a722c430c7b0b1d97def21a59", 0x93}, {&(0x7f0000000300)="ebda1c96c4fc5405ff2cb671da0715f9f71319a6d09d962c77e6240fb2b4c7790de96b79bc7c85b58a722e23262049db9f98235c74a08b17a2c71afb76eb968f7af47bd52b1241d717d09f1f87", 0x4d}, {&(0x7f0000000380)="215b6ff87a595e838edefd62612d4ffc0c8267bd231b2a8463aba9e62141e80ea47eb9e2c26933b2db6aa8325c701e4703568010ec2f99f6e82bf959d497d17bba38d0f24d40e92c6d8794fa4e5825a85f1b3f80a3d0763ef38977127bc09885b6f0c6dba482abd99c90963ecb8895665d8a9cf456d6b1631728ee233c78de5818703ae68e1ddeafdbac955de1564fcbc119c32ae22fd407d27395c257", 0x9d}, {&(0x7f0000000140)="91bd4c5e1a548a919b605046c85636b2f84ce6298da5d9db47f11d777e00cf4b151b0684b0aa3aea037a2b", 0x2b}], 0x4}, 0x4044) sendmsg$kcm(r7, &(0x7f00000004c0)={&(0x7f00000001c0)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r7, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r8 = socket$kcm(0x10, 0x4000000002, 0x10) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/net/tun\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r9, 0x800454e0, &(0x7f0000000980)=r10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r1) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000003200812de45ae087185082cf0300b0eba06e004003000000005106000000000000000000081f401fe091", 0x2e}], 0x1}, 0x0) 04:01:27 executing program 5: socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 04:01:27 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 390.868141][T10965] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 390.896945][T10958] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 390.959717][T10965] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 391.144641][T10965] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. 04:01:27 executing program 4: socketpair(0x0, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x14000, 0x0, 0x0, 0x400000009, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd3, 0x0, 0x1, 0x0, 0x0, 0x7, 0x9, 0xfffffffffffffffe, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x557f, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5, 0xe, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='mem\xff\x03\x00\x00\x00\x00\x00\x00ts\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000100)=0x200000000101) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000400000400000000030000009500000000000000799ffcffffffffff42420200040000009500000000000000f2269604873fe1740d71c498ec541fc423edbbdb001a9c49de"], &(0x7f00000002c0)='GPL\x00', 0x1, 0x96, &(0x7f0000000300)=""/150, 0x41f00, 0x1, [], 0x0, 0x9, r0, 0x8, &(0x7f00000003c0)={0x100000000, 0x7}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0x2, 0x7, 0x5}, 0x10}, 0x70) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r2}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x6) openat$cgroup_ro(r3, &(0x7f0000000200)='cpuacct.usage_sys\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) 04:01:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c0fe8fe55a1bc000500ac14140103000000050000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000800)={&(0x7f0000000040)=@nl=@kern={0x10, 0x0, 0x0, 0x4000}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000200)="d300364554e4cd5a73cd9913f51045f7b7c91aa203d5c2d69ec7369252ccba394529c20635a9418f4b09646b866486e0537a8006cc789ee446189ca4e4d3f4c1020585401abe84fb42ac0766a1df187126f8e509309f9ad2", 0x58}, {&(0x7f0000000280)="b3e8a127a15f8d9ce873313187a971295cde7e7d3f3bd62d7e25d712ec4c28710c724730ccefb0cafed0770b618e34ecf616df6b8606942d6c9aa3172ec814fe0ae1e30b1eb86e372e58287e3b920b78c54c2a8dd334c86f06e1d2e787ae4e246861f2a77ac0267ab6e5514b8f2f59b0f0805c7e3c", 0x75}, {&(0x7f0000000300)="1b9fa7e572e431cbfdd7a698d1cb31900d353df658ae4f094d2cc63a1da4101ada6ec4e549f3dfc7b78914b276b278fbb1aeca474f35d83c7358ed2c777ee6cf73e58f8141e1bd87a09f1d3616ac16bd8767819e0ca8ad20b3deeaf921eaffba14c1bea6b168266206356a58e67ae73485453fd78031677a97ee4c781212c93c094653d50c4cead4c1ab9fc2604b49896e8e53c6e77f0f6a97ccbc18992f41ff450e2ea10d00bbefa2981e3550d3aa00e3d0e974afb2b75853a95d90e939a44def80319c01ddd3fc070f8a826a07e8174644d89121", 0xd5}, {&(0x7f0000000400)="145685dc1d8d4f520bc43cd7438bd2318141951896ba5aa402db8b42bf138036512fbc393d87fabae8f64eff6209f21c2d4594250e09b0e4f45c12b5da04d5cb2716cfcb79b575913a61167707c25126dca4958f5fc9c795bcd3960dd4d68f34caee9ffa61c2a997705d012a68f9e2bf8ffa4d68c3f336b6ea0e9e1fa947036891edf39b939a59c1971eb9a43f31c1ae97a7a783f5d4b1d453ea2cf1dd", 0x9d}, {&(0x7f00000004c0)="e75b2de7ca30ac25cf80f2993bffe02282f314a44c12480e90ed14ae48d9e6fec9d2f0967a2a65eb8c44502965afb5a2bc6387f55ec3f24734ee50bded17652676071fff88cb53b1cd5b6ecebbc74e5c3d269d1f92efbfe567ad052ddfade5399de627fca862ecf248e6dfaa3e78101286b57e273baa2937c63cf5c4", 0x7c}, {&(0x7f0000000540)="2e10ffbfd5546de7d9cadaee788fe8858ca9985f8929ed52f88b6001af8d96f5e9320cb11b2ca3371c7e9773407eef02e0ad0a22ed84e8eda4ea63e05209123b1672063268c42738cd768ebb1dbb23fbf796bd9619ba883c5f7dc1a89159c2aad23feb798aa289c8525591f41104da12003f3886c566c42a66f6d41411538f3a0fda5ee2c42706ef8b4317d076e5bcd3fd06fb0ea499422c5ed39ac741cf143c537b701f8b2332e2bbf31f6f558f0661869ee609", 0xb4}, {&(0x7f0000000600)="e8ec520de25dd212d06880a75ca8e05d7e0608f394012613796b5ce05f057970ffd9f70c33efff2341e64a899fb0315b2bc82bba83127aca81a6e43da98847f1ec5b809badc6294ee2a8df42cd18567caa6e46f4de03c43ca456c72f3510a9fe6ecba9b34f9d2b4640d835062948c2ce3a4179bcfd028d6093fcf8bd8e1b2314ba7d61562995dcdc8c163632e63f7ad3", 0x90}], 0x7, &(0x7f0000000740)=[{0x50, 0x1be, 0x4, "a902d17a313c594c2753f7d4a1b4422556cbc10b9a4cded718d4118794536ebdae6847ce15daa63a170e03ff7bdb5665c80d4b1bd4a4b616b36f"}, {0x60, 0x116, 0x1, "74f19eeca5f66f6643da9cbbd5c5303bb1d3cc4dc8d8e37e59e9ccca923f189d936ff27491829ca09c517f0b0cb2228e94c06710282a517c9132d1f035e4710d6c9061c789c82a352695cf59"}], 0xb0}, 0x4000) [ 391.201901][T10965] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 04:01:27 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:27 executing program 0: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:27 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0xc0401, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1b, 0xd, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@generic={0x8000, 0xaed9, 0x1000, 0x2, 0xfffffffffffffffa}, @ldst={0x3, 0x3, 0x3, 0xf, 0x6, 0x50, 0x5}, @exit, @call={0x85, 0x0, 0x0, 0x43}, @ldst={0x0, 0x3, 0x3, 0xb, 0xb}, @map={0x18, 0x9, 0x1, 0x0, 0xffffffffffffff9c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x7fffffff}, @alu={0x7, 0x8001, 0x0, 0x7, 0xb, 0x10}]}, &(0x7f0000000140)='syzkaller\x00', 0x9, 0x8b, &(0x7f0000000280)=""/139, 0x40f00, 0x1, [], 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x2, 0xf, 0x6, 0x800}, 0x10}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000100)='\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000001c0)=r1, 0x4) sendmsg(r1, &(0x7f0000002400)={&(0x7f0000000000)=@in={0x2, 0x4e20, @local}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0) 04:01:28 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f00000027c0)={&(0x7f00000001c0)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1400000000000000290000000800000004000000"], 0x14}, 0x0) sendmsg$kcm(r0, &(0x7f0000000640)={&(0x7f0000000000)=@pptp={0x18, 0x2, {0x2, @remote}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000080)="642311817400793f03a482c3636bdb4c3c8ad8370949ce3cdd9b0ccdf5e2ea71371868325c24627aacd5957e08874cc45eca3e12aab58a6789550067f9e9e692fdce39b11b374237bf6a1ad6a6d69f8b6fcb53dcbc3df93c0968e32a600e37c7dbf0e19d386c9b91dafab7b6e49e8c5bb93ee9208a5da2603ec5647d801aeee46a3575df4d101c1d1e7682cc12fc17fafb1ca0b7064827521b679099751e799cde17becb133609514bbd207cac53dd2fc2b6471be51b5a2a5c46d96c38f9239a5676c23b888d417a9a294c285e0c8421d6ac30e7788efebb5a22f2c8814cea4028b63ee134b504946482c6d0bc23f192c5558d75bf191ff7", 0xf8}, {&(0x7f0000000240)="584f3ffdcdf6d1e1ed24a513d6a4a2b0cc56a5c40ce3bf02e2b8909b5312bc2c0b97fbbcac6110671c487a55e6825fa08c5c864d1452b0483120d31b97e5ad45d4c903c9a05ddf33113ac7923fe7122b0c08ef4cbe6ebe1e89ba4c22cee5a5e723fa0b5fd7f25059077a1059bba96580f1bd44a6373f319f69e8abfd551616c1bcb8e710cf4dca4545eda5b7a456b41b75fe00d4596fa18b6378bff48fd6fc6834ec562de7457370e3ba8d77cc0a4f1239cc243057e857d14ef1bc6fedd2e832e16ed14b202b043325f65e98ec7f73b0077e8a481c95d220386dae5e8d9db768483e9b0adb252bb41804da18e1bc4c144a7c89275b38ee0fc7314a847da5", 0xfe}, {&(0x7f0000000340)="9195f577baaea84bf5abcbc3db7edaab2868e705b4a10fec287fbb0cdd743980dcc7833fdf5244653bda65e98ed86b9e7f995c02628082f008adf73b074cf56b4730478549630c02279fd3f381d1", 0x4e}, {&(0x7f00000003c0)="4e9c6c74178a803b783de23775fbf4fce5e7b0e17f40928a338c267268694b8fd5589b62ca886350494c3656b53375d4a7b6de4fa764fc8d4b26a92aac95c94305ac6e998cdcf0fb780c41fa561b155ee592d227a952a69bbaf6b3f9f1d20e0a8be29cb3994f2d21b3c98035ee79734804eb0c48caf40abb8d4d4ae7899f177ffa2d055f1425be8399bed7b2e3f031216c6eb2520bb16d4889cb7d031f837b44559506f7c5e3bb602c2d34", 0xab}, {&(0x7f0000000480)="8969f5260672f7ba23fe3b9cd03ac6389ea26fc5b82e01ca8d664fd5280ab4ea13a44c023d7b77dd977a6af955352a9c988d61e859eb0f39bdf43a95c00c81a0edeb6ad985b9a162b7a60d415cbdce1db28e38c30cdbd7d9cb1b4697d8048029fd5fa81c933e5605af264f4ee184e741529ac1f1ca70e461f82326879fe39e7301464b82b9acc9e7d1dda630cf96f74190fb21bc088f98d884cfa8e20b5670805fcc0da6094ecc9d16b88db7f45425632305aba4009046330cf3be88dc59e115cd1a6963d4ed0ca1ca3d7a6e72e6b5df36b8ef3b2a3ee833ddb6b8e26361a94657fe90ca7acf", 0xe6}, {&(0x7f0000000580)="643b3d148bce59ef31f6c6de54de6e292d3c18", 0x13}], 0x6}, 0x8000) [ 391.417541][T10997] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 391.469683][ T24] audit: type=1804 audit(1560830488.122:37): pid=11002 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir126187450/syzkaller.XmIJEY/77/memory.events" dev="sda1" ino=16853 res=1 04:01:28 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) setsockopt$sock_attach_bpf(r0, 0x1, 0x1d, &(0x7f00000007c0), 0x4) r2 = socket$kcm(0x10, 0x7, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f0000000340)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r7, r5, 0x0, 0xfffffffffffffe84, &(0x7f0000000740)='\x00'}, 0x30) write$cgroup_subtree(r4, &(0x7f0000000780)=ANY=[@ANYBLOB="03d88a8b74036ed7e08f930186dd60b5c932599b32b2870900000000000f6e0000000077537d91d2f51cf3702d076da5d50f30b03c1f16e6cbbb8ecce1ba1b1e4238cf820b69c32a31c3167d1f419c41c2c902d9762a558d3e3970fafa6d5c87359152fe304465063b38069e0f554c866728000000"], 0x75) ioctl$TUNGETDEVNETNS(r4, 0x54e3, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file1\x00'}, 0x10) r8 = gettid() perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x6a24, 0x0, 0x0, 0x5, 0x88800, 0x8, 0x9, 0x0, 0x100000000, 0x6, 0x7, 0x800, 0x0, 0x4, 0x8, 0x3, 0x200, 0x1, 0xb8, 0x120, 0x3, 0x9, 0x11, 0x0, 0x1, 0x8, 0x20, 0x6, 0x8, 0x7, 0x43, 0x5, 0x1ff, 0x10001, 0x0, 0x9, 0x0, @perf_config_ext={0x400, 0x1}, 0x40, 0x4, 0x1, 0x7, 0x0, 0x0, 0x81}, r8, 0x2, r5, 0x2) sendmsg$kcm(r2, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000100)={r2}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f0000000180)='./file0\x00'}, 0x10) [ 391.517284][T10997] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:01:28 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:28 executing program 0: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r6, 0x5, r5, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:28 executing program 4: r0 = socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) r1 = socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r3, &(0x7f00000002c0)="a7f32c5ad7a6d145c887e131eb9175cdb9674f084491b0a73dbc758e5ea8d680e812d4b4ce740e27b2630f40849ef750418a2870017a5301dc2a7b4d1d6aa97aa3f28341066fef4f49c903bcfe4bdc76dfb94c8720c273d25ecaef22bf1494bd", 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000500)={r1}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r5, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r4, 0x0, 0xfd00) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r3, &(0x7f0000000400)="1bfdd6a6e010de2a8426df93596c27598dab0843d349619f23ed16cec705ef9f8807631137fb32185754e1a5eba271c1e86a4af657a8", 0x0}, 0x18) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 391.581911][ T24] audit: type=1800 audit(1560830488.122:38): pid=11002 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=16853 res=0 04:01:28 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x11, 0x0, 0xaf2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) 04:01:28 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xb00, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\xff', 0x100401, 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0x9) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) [ 391.760031][ T24] audit: type=1800 audit(1560830488.182:39): pid=10994 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=16853 res=0 [ 391.822409][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 391.822719][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 391.828246][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 391.840401][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 391.902390][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 391.908266][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:01:28 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_config_ext, 0x0, 0x0, 0x10, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0x2, 0x5, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000140)) setsockopt$sock_attach_bpf(r0, 0x84, 0x79, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r1, 0xf, 0x3}, 0x14) [ 392.069502][T11017] device nr0 entered promiscuous mode 04:01:28 executing program 1: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1d", 0x21}], 0x1}, 0x0) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x8955, &(0x7f0000000040)=0x2) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x8953, &(0x7f0000000040)=0x2) 04:01:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpu.stat\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000003c0)={r0}) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000380)) r1 = socket$kcm(0xa, 0x400000005, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x7, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, [@exit, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xbc0}, @alu={0x4, 0x9f0, 0xb, 0xa, 0xb, 0xfffffffffffffffc, 0xfffffffffffffffc}]}, &(0x7f0000000180)='syzkaller\x00', 0x3f, 0x3e, &(0x7f00000001c0)=""/62, 0x40f00, 0x2, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, &(0x7f0000000200)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xa, 0x9, 0x20}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x29, 0x21, &(0x7f0000000000)=r2, 0x4) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x42}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000100)="fa", 0x1}], 0x1, 0x0, 0xfffffffffffffec9}, 0x40) 04:01:28 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x16, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000000000000000000000000000000000000347e17fc07f24d0fda02eb77ebd998f3ec0aebd7c27937229d5967792bd64804d3e6308b033eaf580cdd0aa28e27973175be45e9bbbc066364eacc10b55554c62fe2232c260239065d23d479890ab6da00976de7387c3f42e8f1ff58c0bb05568cbb7ab1b941803e97ec6acee021d40f097ed0bb4731804842a330e861372af8abc3a476f5ad8880b0b185188e15ba538312d9"], &(0x7f0000000000)='Q\xa2\xa2\x11\xbbo-\x95\xd3\xc0I\x960(U\x06\t.\xc3\t\xa4\xd5\x99\x02_2\x01\r\xf8\xedxR\xc2\a\xc0\x17\x15k3\xfc\xe7\x9d\xea\xe7\x19M#\"N\xe4\xe4\xc5\xe3!\xfd\x80\xb7', 0x5, 0xfb, &(0x7f00000001c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x2}, 0x10}, 0x70) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r2, r1, 0x3, 0x2}, 0x10) [ 392.671573][T11017] device nr0 entered promiscuous mode 04:01:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000001c0)=r2, 0x4) sendmsg(r2, &(0x7f0000002400)={&(0x7f0000000000)=@in={0x2, 0x4e20, @local}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000c40)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) perf_event_open$cgroup(&(0x7f0000000bc0)={0x3, 0x70, 0xf1, 0x0, 0x6857, 0xff, 0x0, 0x9143, 0x80, 0x2, 0x6, 0x2, 0x8, 0x7, 0x5, 0x6, 0xfffffffffffffff7, 0x9, 0x3f, 0x1, 0xfffffffffffffffe, 0x3, 0x7, 0x7ff, 0x3, 0x2, 0x4, 0x5, 0x37d, 0x9, 0x0, 0x2, 0x150b, 0x5, 0x4, 0x9, 0x9, 0x6, 0x0, 0xdd, 0x0, @perf_config_ext={0x4ca5, 0x2}, 0x0, 0x3, 0x3, 0x8, 0x80000001, 0x7c00000000000000, 0x8}, r3, 0x7, r0, 0x8) sendmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000000c0)="9bbbbc699ded6998109caf4a46d9f7960d9e72db33973c0d849f283e970d1b520d20cb1c7613c51274c86894022a8ae718b01dae4884b07dbb8322ce77e70a7356df2c526646aed0354e422d2ee25b2b56bd681e19", 0x55}, {&(0x7f0000000200)="1cb4499dd3890f16774f3df39aa24ee53a2ebaef7ed5e1371c8b6389c142a7056b9b9a0023a29c64dd05902cad69791a20d84dd98ff570ee69501a6008ec5c8680d1d9bd407fe4fb44c22ca4a37205c59f7570f1138ab1c5281a2ab3de6ecd8ad2a2e4c028dc620d0ff6728a5daaff6306ab95558b717d386ba6e4b8d5c3c9ed87a68509e424f012934c7b5efbb40ef074c894c95012582e26fececfb699a695d9524f01382db810f8588527a19df2f005e220aa59aad6ee388cecded60ba0bca3c10af8d41256fab69019b730c89d33", 0xd0}, {&(0x7f0000000380)="886ac541649ff3a935129c1938092eec66cf9efbc5ad504ebf1e0e3dde7f8510891e4c0f152841f2d19e68842a4812e5bd9728379155f355f5800176ecdf56713dd768491b97183c295d742807869ce560fcc0329f06393ef1c184", 0x5b}, {&(0x7f0000000400)="4467b647bb7ba1e40603efd4c9fdb87125877428ddd7f4d6aba2b422fab7cc6ae2cafce3c71ec89ab8c372f0252cb18e86474d98435a47bd6aaa25d59a765d23ab26b4690ae7b97d90553f9703b44d30a4c24ee34266d25ececae96379c45a34bab378c86c0149f4a81995c85e89fbfc1593d244bf853fe3063586bff2c3e47d0c2f05b91a9119b93fb084b76b17c19560f584e697be61bc927c1dd49de9f49a12eb3835ecb4d0670a00eb296da3179b7b05a36063fdc6c026a657cf5eab777c4fd9ccd4f80cb43354f7beacaefffa40a645fc885aa1abd1e4ab90be07", 0xdd}, {&(0x7f0000000500)="f85c2c968ebf442fc8ce888dbc0ffb8c0794094af3ba563c6235b33d23869cd0ef30e78b86a74a5023e8877672020a06ff13de9d512ed18010586935839a3206b453b65683082db23fc9bbd223cad480b37f9d85f3dd9617d8ab5e153e0b66df4976c5237a7b77d320f36b687ca0e2f8bdab4a57066ec4be0dbd03a8111ed4267e7d51435331d022782fd3d5bfff442b0d77f3f7ac68460c204dbd08cd2328716d07a65df585ad590dba13f58d7c968762cc58e11c27a10f2cc90d2fb6cf1e6d2bb580f563d02a", 0xc7}], 0x5, &(0x7f0000000c80)=ANY=[@ANYBLOB="38000000000000008400000000080000ff471ce269fb9f375d18e0304556b5b99223c48ef65df075f484cacb5111fa8d08050cb87b0000007001000000000000170100000000000048da37bdc2829b5ec3a456d1f0303eed8976d54880ff512bf0e263e790ffcf8c585a49e6984750575b90cabd560086864c549a9ee20795b35181901788312aac67561373e1f7d1baade344ec71eadf8e145e20073449bd490faa2af2f1570000c0000000000000003f010000000000007286551981b11111b5f0b7ff7d275f73f206d2a753cbc1fd91cda6c98ffaaef3a52e1a48087bc42d51cd8d8c6a26f5095bbb167502fed0933de3357eb2aeb8ba9fe9b83d421704338fad6bea9f41ad163563c9d5a532656b6010e30400c2307999c35b352ef9d289afcba5f8be2b4e97e43c5e6ef3f03677325a28335a2e730289153bf97529f915b54fb45a7291fad10a2603aefba0412c8ca6c244bc3d330473613465d1e5373765bf056db3db970000000000000030000000000000000000000006000000f2bdf081d534a96cf4428b5d698af163cc531881ef3d67a6fbced8e0a4000000c800000000000000ba0000000100000094ae9128d614108bcc57393bbf03a0ffd24f88dba11807799ed34327ef90c206cd459bb2bffc3c4bc1244bd8e4073e2c59da168234ad34f92d9f69a59a988827f2c2067c3a3e114434a42864242a321567d8cf434d6449283748fa474580007597610c1da5938e4e99ad8ddaaa2ea97bee9b5efb257ede19652f10620a6f9b0c4e4ee25dedf86e3cd18d94b3ef6814712eb72a7f3f81bdecf52b58a728a55f6fcae923cca3418f91a4a47b143df480ff7d51a5c736190000c8000000000000003f010000ffff000027532eb5ee0dc96cead391ce601b52db9b088fc7a6b804bd355c620000000000001d39dad3ead1d3e1ca0d22bca3bf40abf5f017a6774d2edd9a8099a331b584b802984638242ab92e5599a2453aa4ba6ed4a78ff6fe419fffc276a546cbd256f40315a88ca7eee1edf7afa98342bfcbc9a31b6e31702b579687eaa5d3d83433ba45813a0887a12e3c7874521e056c68bdac8bb89b461bfcedc24a1dbcb43844d73c9669017c8f3e4984428cff0ffd995c5d00000000000038000000000000003f0100000000000074c05f520bcb7642d1dffe40e3255955b08136ba3abeb2d872e4b0d834fda71dd57a000000000000b800000000000000ff010000090000007ad7b57e30005e82d50318bdddff57b673ba762c6b8c8feb93b57bfcf8601b5a6dda4feed453fedab41537d137889a3067d0622e69223c15b64ec5ba1129104a1d2bfc15253c96be2dd57ba46a1911bc2c9ce3370c1193743ce2115ec4dc0275572e2c908afe5cd8b2ad1f2ed91442d292612552212de750f1f048b2f4967ec0515bd62f830d120e3422971cbb9c5e6fd7d153645fca495d042dc6f4c52acc661757c2ea0a9d28325000000000000000bf2fab780a63cf2c610c8f20f44bfb4c485a81a8e640e91adf5ac1d702d2d1d99132d39d8b7bbbfce752151248b080e22432e50c8a7d80e3969d930a01ff3dbb0de8202f44ec0000c0000000000000000901000003000000634c965393814d7951f5c551dd2c25dd61ef6848ce400ac6517f08c40fc9798759cf870991ab4f846edf09071953928097a10b6329deb1408fd79a4c5235c57da448f26a35256604cb1ca94dbaed72af1ead7064f7edfd1dc66f682e19e16fe52763353f14b3eacce14101be5eeb19afb44db6aff680cd478fcc0c1c419ffff9b73c0d828cc7814f943226e4523fb0d14edf1788346214ab9db46cd4fd03fcffe1bd2f5e3afd4ff71f46ad5b00000000"], 0x528}, 0x1) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)=0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) 04:01:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_type(r0, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="2b6d656d6f0600202b644dbd7d632bf147eae0e811252e78d9f97aa68610d93b299797ba75b8d1fd9d1b06818198b7448439c4f45e404196ee8e9573ee9218a4f05cfec1fdf3404e6cddaadd96ee51d13213be2d41f4e3597f000000e9979ff1e3abd8f64936499d66e50a01"], 0x8) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r2, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x3ff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x9, 0x4}, 0x0, 0x0, &(0x7f0000000200)={0x4, 0x3, 0x9, 0xff}, &(0x7f0000000240)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r3, 0x4) write$cgroup_pid(r1, &(0x7f0000000000), 0xcbaa60f5) 04:01:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001380)={r0, &(0x7f0000001340)="7ffc6dc27b6586c4aa9ebffb48cfcdf39261076888f97ade968c98c86bf92fb10a8e651bd76776d016885de526555ef326662b642ef2f06dbd", 0x0}, 0x18) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000140)) recvmsg$kcm(r1, &(0x7f0000002240)={&(0x7f0000001f40)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001fc0)=""/132, 0x84}, {&(0x7f0000002080)=""/149, 0x95}, {&(0x7f0000002140)=""/68, 0x44}], 0x3, &(0x7f0000002200)=""/22, 0x16}, 0x1) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={&(0x7f00000013c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x1, 0x8}}, @var={0x1, 0x0, 0x0, 0xe, 0x4, 0x1}]}, {0x0, [0x5f, 0x5f, 0x30, 0x5f, 0x3e, 0x7f, 0x30]}}, &(0x7f00000022c0)=""/96, 0x49, 0x46}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.events\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1f, 0x4, 0x5b, 0x1, 0x8, 0xffffffffffffffff, 0x5, [], r2, 0xffffffffffffff9c, 0x0, 0x5}, 0x3c) openat$cgroup_procs(r4, &(0x7f0000001300)='cgroup.procs\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002380)={0x17, 0xff, 0x3f, 0x4, 0x41, r0, 0x6, [], r2, r3, 0x4, 0x2}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000300)="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", &(0x7f0000000180)=""/204}, 0x18) 04:01:29 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:29 executing program 3: r0 = openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0x9) r1 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x25, &(0x7f0000000000), 0xfe1a) 04:01:29 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() socket$kcm(0x11, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7) mkdirat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x1ff) r2 = openat$cgroup_ro(r1, &(0x7f0000000200)='cpuset.effective_cpus\x00', 0x0, 0x0) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000480)=[{&(0x7f00000003c0)=""/164, 0xa4}, {&(0x7f0000000280)=""/53, 0x35}], 0x2, &(0x7f00000004c0)=""/216, 0xd8}, 0x2120) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000600)=r3) r4 = socket$kcm(0x11, 0x3, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r5 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000120081f87059ae08060c04000a006b10400103fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x3f, 0xd4, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc923, 0x101, 0x1, 0x0, 0x0, 0x9, 0xfffffffffffffea1, 0x1, 0x0, 0x4, 0x2, 0x1, 0xfff, 0x101, 0x80000000, 0x7, 0xffffffffffffffe0, 0x9, 0xffffffffffffffff, 0x4, 0x0, 0x1, 0x0, 0x80000000, 0x3, 0x80000001, 0x8, 0x4, 0x0, 0x5, 0x1, @perf_config_ext={0x0, 0x8}, 0x181, 0x0, 0x8001, 0x5, 0x9, 0xddb, 0xfffffffffffffffa}, 0x0, 0x2, 0xffffffffffffffff, 0x2) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f00000000c0)={r0}) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000240)) 04:01:29 executing program 3: r0 = socket$kcm(0x2, 0x17, 0x0) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x84, 0xb, 0x0, 0x4c15351e4962e777) socket$kcm(0x29, 0x5, 0x0) 04:01:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='cpuacct.usage_all\x00', 0x0, 0x0) r1 = openat$cgroup(r0, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x5, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r2, &(0x7f0000000380)="c8be693c80ddf93a5cbf63d93caa5aaf28344ddfc5968284260000e31da3cdf598ed82ab69d09ae50c2d24cfbb0971ef91a80505fa6b79542015f677af15b0f7eef094a1f5fcc7ef72b4e4290d30da5457bd63c2ca3ff90d88fa1c4a18e7ca55036026a71fae62a71a2b665f087850b68f36117805139585395a29149947b64eaf88e075ee2fe6fae8a1b2e8247347c0adb11ff8580b53aea70bc7e365e0c2070b1e0e80e833fbadd51a5f5b261aaf636c36af4f63b17c0aa3f9c9d1be7055cb107e7f5d3f11daaed4204a5f6f5c92131764f7f0ad"}, 0x10) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r3, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r4 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="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", 0xfb}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup/syz1\x00', 0x200002, 0x0) 04:01:29 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x1, 0x320, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)={0x5, 0x6, 0x100200000, 0x8000000001, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000100)="f2ccf1cf30332d7ce42d4d72436212ae1f46193587e7339f421d34fb9c63b153db85c51a946def9667eb6aa04516f91b66e69b25ac9076bd5b96634a363275bbcb226157ad6f56096f5deaabc4d5ca896c4d50b09938612ec85fc2559c147810267f07101dd7d5b63433cec547bff76cc12f84e064fbd2de0a004c2a8da9e36edd0184ec8b199c59fe82c2619d3fffa8c9d15f329c1a33f4", &(0x7f0000000040)=""/14}, 0x18) 04:01:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x200000000b, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x4, 0x7, 0x5, 0x100000001, 0x0, 0x7a60d7e4, 0x8, 0xc, 0x400, 0xfffffffffffffff7, 0x0, 0x3, 0x4f, 0xffff, 0x9, 0x8, 0x4, 0xffff, 0x8001, 0x537, 0x7fff, 0x5, 0x2, 0x7, 0x533580000, 0x6, 0x1ff, 0x176, 0x1f, 0x8, 0xe, 0x0, 0x97, 0x0, 0x6, 0x7ff, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0x7fff}, 0x10000, 0x36a, 0x3, 0x5, 0x2, 0x2, 0xfffffffffffffff8}, r2, 0xa, r0, 0x8) setsockopt$sock_attach_bpf(r1, 0x84, 0x10, &(0x7f0000000180), 0xc) [ 393.230435][T11088] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.1'. [ 393.345195][T11088] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.1'. 04:01:30 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:30 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x4000000000005, 0x3, 0x100000001, 0x6}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000440)="813424b2944106608678c245b9f9718766bede4ed6e2223c45c8b2039b8d6e6f192c6eb937ebde9e3f40487f078dcb620a12eae70f7f6138dc49c9e59e9f76fcfac9db34837d7501427542159e8ae4de03b4f64ddbedeb7741ebae900cba00898c0e9a27278d9f8ccedf12006ec2ff90b23aad0e3f17680c5ed8b6a4c2eccc14b674b5da367619adbed01735eec1e2b1a4b48b54cbcaebf15a010a07baea2e648d6a3821d2e7d8ad1d23b1bb0e4e0bd857c7e2b14f4018d733a509d65338dcecfec650e88a584010b543f822fa9ab72928", 0x0}, 0x20) write$cgroup_subtree(r0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f00000000c0)={0x40000000003, 0x0, 0x740000, 0x0, 0x10020000008, 0x0}, 0x21) recvmsg(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000840)=@xdp, 0x80, &(0x7f0000000ec0)=[{&(0x7f00000008c0)=""/171, 0xab}, {&(0x7f0000000980)=""/190, 0xbe}, {&(0x7f0000000a40)=""/242, 0xf2}, {&(0x7f0000000b40)=""/174, 0xae}, {&(0x7f0000000c00)=""/87, 0x57}, {&(0x7f0000000c80)=""/203, 0xcb}, {&(0x7f0000000d80)=""/83, 0x53}, {&(0x7f0000001b80)=""/4096, 0x1000}, {&(0x7f0000000e00)=""/163, 0xa3}], 0x9}, 0x2000) recvmsg$kcm(0xffffffffffffffff, &(0x7f000002a980)={&(0x7f0000028500)=@can={0x1d, 0x0}, 0x80, &(0x7f000002a880)=[{&(0x7f0000028580)=""/4096, 0x1000}, {&(0x7f0000029580)=""/107, 0x6b}, {&(0x7f0000029600)=""/138, 0x8a}, {&(0x7f00000296c0)=""/168, 0xa8}, {&(0x7f0000029780)=""/255, 0xff}, {&(0x7f0000029880)=""/4096, 0x1000}], 0x6, &(0x7f000002a900)=""/112, 0x70}, 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f000002a9c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = bpf$MAP_CREATE(0x2, &(0x7f000002aa00)={0x7, 0x0, 0x77fffb, 0x0, 0x820005, 0x1, 0x6, [], r2, 0xffffffffffffffff, 0xfffffffffffffffd, 0x3}, 0x3c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740000, 0x0, 0x20820000, r3}, 0x2c) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)={r4}) 04:01:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001340)={0x0, 0x0, 0x18}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xeca60000, 0xffffff7f01030000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x73}, 0x0) 04:01:30 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001380)={r0, &(0x7f0000001340)="7ffc6dc27b6586c4aa9ebffb48cfcdf39261076888f97ade968c98c86bf92fb10a8e651bd76776d016885de526555ef326662b642ef2f06dbd", 0x0}, 0x18) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000140)) recvmsg$kcm(r1, &(0x7f0000002240)={&(0x7f0000001f40)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001fc0)=""/132, 0x84}, {&(0x7f0000002080)=""/149, 0x95}, {&(0x7f0000002140)=""/68, 0x44}], 0x3, &(0x7f0000002200)=""/22, 0x16}, 0x1) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={&(0x7f00000013c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x1, 0x8}}, @var={0x1, 0x0, 0x0, 0xe, 0x4, 0x1}]}, {0x0, [0x5f, 0x5f, 0x30, 0x5f, 0x3e, 0x7f, 0x30]}}, &(0x7f00000022c0)=""/96, 0x49, 0x46}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.events\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1f, 0x4, 0x5b, 0x1, 0x8, 0xffffffffffffffff, 0x5, [], r2, 0xffffffffffffff9c, 0x0, 0x5}, 0x3c) openat$cgroup_procs(r4, &(0x7f0000001300)='cgroup.procs\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002380)={0x17, 0xff, 0x3f, 0x4, 0x41, r0, 0x6, [], r2, r3, 0x4, 0x2}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000300)="218b4adccc03deb94e984194fe2e7b0dff32014f4afea31b7d904762d5dd9ba06407405d93f3194ab038e90199369ee048bedcaf037e9cffc70eb2ce32d78bf2859097086317f3db3195b7062b3d4afb522042433e81ca31331be7e8c9795b7125c802855f8377374c4d2cb8adf7a24251eda27e1666076e02ccce50116121750680496be86da2a3f74dca22c977a38d6b4452bddd355beaaddb12f2f52cf83590e33043294239fee7424e43a4f921820c6093940b64b715b3affac9faa222b0666263225bcf6251f80592fd6ab236dfd20e1013917a5b616f05a320d1a0822247a5a8824038851b3de290f3606612d1c3dd2d053cd0d22a99dbabaef19e188c5d72d80beb24477a7febf1b5c344b064d3e6af3897a703f9559877cecd1daaf91caacedb899a08911960b29a342c879f441e4a49e8e2dd6c3fe66b6faecd2f005a637fef293a42f6ca167505b909f44cb2a2fa323fd62a2f865e7c10b0117287499813774e40633c8feb694e3c20c5f51cc755d04bb401ef680430a778aa9c7b168b77975cd6494f2bc799e30e772a0b4429e7ddbad029949edad421a71a4775c7f0722ecb715f2a9174a75ab05cb5ea20261f19b3cdbde0f82d3f0cbd19b8b74a7141ef922d3c87691ac9b9abcbda46ae7cae9a57df6b42e6bb43d7e2a2774c42cd012d139a8acd9467fbe07c2807a79bdfef600a3c6da73555d2fef6597c646dce82cba7fadd2694d62c82f36762bdd26d1e2077938a706e798dd0650fd35aab122bbccbc1874881405ef53f21c65054588ed4aa90fa6e673be299c83f82dde31aee53726204ff75f899a19e99a753e63fb89faf65d7bada0f1520c8c9bd16d8fc7fc6361e8f79c8c7f37b3e2c1f72b94be75e76f25be1cdd64d3f2cd8c129fc5c24e8c464ffb2285205c9de168be439f33b7a15f8d6115ddd96cbba996aaf9bdc314af5aeac5a2955e1ff5ff11599950a34b1af95a39245785c70d30ccddab223ab7e9d2a04092e24e6ed04605c0aa4edef57559a9b3f53376ada1bcc41e0c6f8e79708f9826290b1de0d4f852fe290948bde636f8538a8a659f00d755d978bcb2318a2443b54ea849877f818db89c501638e2f5f1090d68f9f26251517c91f359079f0d9e483750076f7829cefa569bc26bc362622f64d24603096c2430ef5fcdacf0c30ac3850f82f43ffdb1146bb101f2a23458d9eda20a68a3fb72505c6bf4aa4c3f7e056a6ccc4d865782e90fc8734166e3a17e5113f96c198e9253b1c872771f97f8475417f71826bb377064847a60ccba2d13f9893c2b4970d17e648b9e265b457efa127d2e34fd4afe51c52960e702120de33b9a6669111d2785f32a98183f113d2327eafc799909901e9a208f4f7339f1a6d0e5ecc5e98a0dc72951c844c2d9fe9c706ec1a795245d88609aed6a268318e213d64d3852797fbf7d303c35750c39916ac4f010a4cc25f7ebdaae5d6e5602433822a905690b0d026fa06f1f5bc6ce679aba0494af2ff5bc545ced0e7595b1ccb3eb8d8589afae831736bea3a57c1f3b65d4805dc589d6adeeee45de40c7ad8e18e23f7269d7c407f143edbc625016c227406a299f1a274f773e4dfc2374d684ed0339d2ae838d3d9a3274300d7f58299256f35d5e25f397a93ab5cd101f3edecb0241839c1ee915a20369a196fd0a147373135614d3e61fd25005892ca8c12cab03df3ab1991c6bd19d15d458fb099a6faad21a4be304432aa1a08f8754df49f09cbeef37152c3fe46c7f1b85b335142c01328ab7523841665d196994504b047a59db8d512bdf573623bf9cb50158bb8771e6433763d30910108b473ecf356de8e09bfd5161a9c12a269298201ea695358681895b7ecba7413ea5e479057ab3ab1167a641734e022be2d65d8e1dcbead7d1cc627decadd79c6fe4a4ea9dcf99c5db7381251b634f5aa11fd002847cfc366269aef3f7806058177cd0b26359242b2142dc7af086b942d035ed09c1bd1dd4f462b1fc6d7de3d96cae47926faecd0bd859fcb98266e2e776d7a6902ae2c3ee5df671815d3344c6b3f61be5efd6e7b67debc7518724427bc6fa51b89aae3b896751559244722c2454de8cb7fa795aae6916fba8de36b61bad18c0177fac2351f7a4e5aa7e9580b46edd4bc5b2d73ead682c8bfb98c09cccf48364bf134a5d81a88ed8c85f8d9470a71ac1aeb2f48455eddb07505ef9c633b838ba686bf26d48e55a3506e18043e1b96605d211c5877b225c7b035935f509198368ce77a1fb227cb8fcdaaefbaead194cfcd096ffdfb1150a1edbedac1b07c89559a1142f2a6eb5ec285d4b134f2a090e8e3604d7a51edf77d2aa00f9f000c736d89770caf3de3fb5f20c70bceb063feebb72cb9e71096279fc519af0951a880043b3b1ab04a18c362f86802055c13d45186e3da8fba61dc0604955552498a470687bfca1fe3820a78ad178d6ab70b9c32dc69f1f8b3ec339ffe91f821c6ea884dc0c10240ba1a1b67521ac75eff0c16a38ef565e6735938b40f4938447842e006438cfc74ab1c0be415fe1a8a2ecd28da00d803fe55160e33061e4bb6f21967b63bcb85d543f280826ea54921467d447b01f47a5f2fa07d4915a231164b050c4fbc91735e188bdad03dd3baaac52127317c9097c2c44fdfa1a28a9f631c25ca6020e2952775197684182aef6cc3b930fd428e672181b0ab34d9a070c4d65cca12e9cec9a1d3ba058c35175a84b3ea6abafee1234660535d607654a72d8cddc8d6cc93ea66642c5c4e7e8ff728cf50f3ceae1734b70e0251d5b3ae9df8b06e11d47acdb39ef6e1fbcc457d9b5ad4c057522cbd510dd1f7b0d227b6822297bb6a6dcef83bcf47fa175366d57035b791ce0274baaed2fd40bae7ff7888f6d56d877fa53c21a3cb53c150c9e37d85afb8a49f6540fb77dc89d880fc884342469e724464abbcbc95ca2b67584e410dfb40023236e2602fbbd4613a105211abdc170a45f3fbb6af7ea9eed7f0fffb3d5d39d9c8aaea045d359b539a89c9dd877a0d577323b03570dc4c3d6b269b64e76e8dd1e54c4f2bda8652c9eb8908c652a74645d68302b43cb0d754fca3f1a5afdf6dbd273405264053f982b6c2c977ab154b21f6a17800d66e2ce32b0a660f91fe21ad96e03c91e577b5ce4a0c5851a7a459a68de0f10adba36dc4d7a965e290984056f534c748048ced5e266c541c9b67472de1ca396c8ff0cd56d0993284338595a6219987df4b666e9add6d15dec1de38950a3d8f6bf8ebc1a2b250027ee409aabf0e6380ccdb05a759c5e61e36c610f6be2b5e3060defae60285988af3fb4ee3d04fae56a370a8c96a2af9507008f8848ec2f438221b4ad73bb454d7b011b8f2ba983b58e12a09b75dfe202943747f3d3f1d55a65eaf79417f6998a4530c55a2e8584c27af8b86eb80438a71515600d5440cb0d1256ecd06d53891d3290cd0ebc246cafd61e3dc2d20699fd408f1b4ebbc7ab9a7643ecb2ec9bf8a7d733ccc3d7d9d87393bc4254dcd85b6a9ca2bb6c981cd79756306ffee39e774fbc41461d556e81b47128c8b4fa19d771a29b9ed62533fc3fe681cbf927a933dc7d8d086d2012cc2ee80cce24e2dcd25416011104e6c73b583ed4378c2bd186c643eae12d1064322724679fa3c965660eefa2e521b7f39dc161ec2bc00749f4281790a876849eae8b03d32d6aab8293c1bac8bb6b8509f47e926eb6ac01cd1ff69862799c786027ca20b205c04bf3a2cdcce867e3f7260d45cfcac7dca0726e19eaff32c23dca55e511e3b3952c27cf2dbe69aabc8e64d0308e34456b252d892cc7f4d9702087aef1100e0422f40e58aa37e0524da31b64281ade08dca0411689b12652a8eb46664bd0599d91fc853896705ed4a24b0a04ebdaa171162b8f4201a9038b988aecd1ca450e959c9d9c2ef3b4e6c5ba6abd9ebd084c363e04b448f1dca0826aa8a8745e93ebc1542483c5cb572ed1ba8c9a3a4c2c4eef8c57a373434d25f32bde44caf466965f9470dc971be0ce307b85fe7342c4de9e7bf1340bb437f926fa910b301251baaaf1b27e1f35f1de051b5491423553f2eff2d7b525cc04e31215dd9e92626358c59049d8ae7de2b64602fd1c392e79af7e1feb7103cabc1d7303d4ed5e0a0370154d78fed441765bfeaeb4f3bd5be2f19213bd85a06e5d6347e7c1794a4a6788c0ec1dc4c2902d478d125c4fcb3112d4bb87de395bd3bb436f8df736c0e23acb697eac9253bac0f92a36aab090dc36d7fda588861f7dd735a8f337cfdc7fd48310391a643667271910dfe955f9f42131df02e016b9619481f581eec76d74db360f08449eb19980e7ef4e225432fa9280aeadf01d2bad0f23f2a994650dddf87ea3bc64b30e1fe608928b48b5ec2134d6953322f81c535d36db85ea17b2f47b8d938895d8b5be5fc6df5c2e8d3b26941da3c2aaf65a9cc30a4b253e10b02a321227d2cfba093bcd25f7f8dd18f6d146aae4f171d0aee258c3d366773f335d8619533785417fe37d914f3af762aecfe63f402c976d26fbe21ed2833d638eb12f006c3da651475b2708decce1b5e7eca91e34c2a92dcb6af296e3f5728419ebf32894f78b710728bc132766b3f47c80bd029819f11aac3eb9f3cb6800f0a5b2cfea7d19cd47b3dde781f2276818005ab429fe45669380fe5bf0894157884709f22554d30148c0e141f6cfa89d42ef8852d412bf496b2862cfe380da84989013543012ab3328b39bfbd3d64db39940d87f7984df4ba6b4a72371a11d782a80313fda6322df51fbc14a22f1364388c4bb30a1cb984cdeca825ed2318804a2ebdf126571d84660c1a1cba4b4c7bf786cec6911ae7f7642fd5661b051c64da81d6d67963f55ce08ec8fb0994f6954ea72083c2485547b8105b7eca48be0363775007a9130f29aa6a328d9f73a27148f98e2b41f0333e2cc1d5c3e492ebc6b84284b456ebe8eab57abae1148a9d101bba2939b614880788f4bb3463f26fc5401fe8000c2501118d56c229ab892705bce4c98b451fe2a9f7db601412f69b390b25277e385060c0a2923ae45e912e59122b969debdbd230c6d2c7c34b184b6df6e352a43bc52bf41ad15f96bea1a3b9b2564d6fb41e5ab3142a68ad194d70e1d9019256b9fa29f33720debc034518a73721ea1630edd534998b380433fa4d00da0fd9ff13faa00370e785b7a4e2063dc479d8e5fb10361e5721dc0c5be5e593ccd46556b1cde03328462e35ef44baa8c39d942340cd9624dea6c49c68c1f397107defd95cfad1b2d314f558ebbf0ba7d715e191e2e63dbe8e5336623151c6847d4a9db04dbe1c2edfc07ea723641fbc552556ef62a60205f4a4a0471f4af1100451938acfe98cdc1e872c954957a2e6ef2d1e4bf40fee78e3fd14e316d3bdfd3ea7f7ba9108fa47bd6c8ed1a1ffc5b6988aefb962857bf29d584264529de8569ab1ebc8273b538a40385e88f6c1838bb5beee23cdbc653c9edebdfed27422b2c30d824b1685ba2f2e5109e0cc3cc4f161deadd5f59d51932c47069dc4975b912ba7c10d6c7e1eeac0a8a058712d84212ed29407403fef36b6f61383efb18a4fc6c6af1be726c469aa91e09a49bfc01e28da5c5deefec19a9f72b86650011c3c50c7b092ca73fa8c449bba66cb7c262b235c30faf5167f9f9f7b39e37b034055d5940708e8ff6ba4caa86ff0ae7ecdbd0a4b112fca34b6815eb4269aac3fc8fa3d2bfcd0535702e393bc9fa9db15e03fb825d455d3243145ed7a05f6de075a065e3f34c85f043898e2168ab357b945", &(0x7f0000000180)=""/204}, 0x18) 04:01:30 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000600)=ANY=[@ANYRESDEC, @ANYRESOCT=0x0], 0x2b) 04:01:30 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\xadh\x062M\xb1\xd7\xf1G\xc6`+skc4\x89\xb0\x11\xe5\xf4\xef\x171t\x8e\xb3\xb2\x9c\x97\xcaq\x86\xcct?\x1a\xf1#\xe6\xc1\x02\xc4\a\xfd}\x0f\x90\xf6\x81\x05\x14\t~\x80p\x16\xca.\xb5\xdc\xc4\xfeEx\xa4\xcc\x88\xabg\x0f\x83\xff\xf4\x10\xf4\xb6zf\"\xd5\x11W\xb0\x8e\x7f9`X\n\xd8C\x90V\x01\xb3=\xa8\x9b\xea\x85`\xf4j-\x7f\x8b\x93\xf0N\xd3U\'\xd9\\\xdae\xecQ\xabb1\xc3\xdb\x96t\xbd\xe9\x1c\x9bhI6\xdcql\xc3\xbb\x87\xef\xc0\x80|ce\xa9\xa5\xcc?\xbd[r\xc0\x81?\xb0-\x19\x0e\xc6\x17pA2\xca\xc2l\xd8o|\xeb\xbc\xa4g\xe3\xddjf\t\xb2\xed\xc8\xfb\xd5\xf2U\x8f/\xc7I!\xc7S\n\x86W\x9e\xe7\"D\xec\xa0|\xdf\x98{\xaf\x1e\xb4\x94U\x17\x84\x03BB\x97\xe9\x19@\xb0\xfa\xc7\x8c\xe2\x96\x148\x98\xf2\'\xa1\x11U\x86\xc5{\xc9\xea\x97', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='pids.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000013c0)='\v/cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000001340)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETLINK(r2, 0x400454cd, 0x31f) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r3, &(0x7f0000001300)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1, &(0x7f0000001280)=""/73, 0x49}, 0x2000) 04:01:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES16=r1, @ANYRESOCT], 0x19) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9de) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, &(0x7f0000000100)=r1) write$cgroup_subtree(r0, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00'], 0x1) close(r2) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) close(r1) r5 = getpid() perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x7, 0x80, 0x3, 0x0, 0x0, 0x0, 0x80, 0x2, 0x1f, 0x3, 0x7f, 0x8, 0x6fc6, 0x100000001, 0x8e, 0x8000, 0x4, 0x0, 0x7fff, 0x6, 0x9, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x9, 0x7, 0x4, 0x9, 0xfffffffffffffff7, 0x101, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x80, 0x8, 0xd38, 0x5, 0x7, 0xb47, 0x3}, r5, 0x3, 0xffffffffffffffff, 0x1) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r4) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) 04:01:30 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 393.814395][T11118] cgroup: fork rejected by pids controller in /syz3 04:01:30 executing program 5: r0 = socket$kcm(0x29, 0x7, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x14, &(0x7f0000000080), 0x2cb) recvmsg$kcm(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000440)={&(0x7f0000000000)=@llc={0x1a, 0x0, 0xff, 0x4, 0xc7c7, 0xb75, @random="836baf265911"}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="b67db08418fd1c92e840467535eff339d6f34730239cbff8522a0a0317ada28c84ae9df330154e954d56c2cbcec788ab27684168cf2350a4414490dcb95964000cd5f8794759606b3d447a5c9a88ec4340a8e9e9d98f05b8dde384398649ec65a5", 0x61}, {&(0x7f0000000140)="85b06c31ebe45e29f68e2a8076109a353e0c2712420400a1c6c0a853731a34420e7da2b031cd1ddad503fd32aec12c2f1c524fdf87f0da165398d6fef90d86a957274dcbe533c0fe700e403db6ef3c4a531d30864d827deccf1a464cd7f6ecb25318d127cfb70c6e404606ef3f7527c7637740ac6a6f9f295d49255272093243", 0x80}, {&(0x7f00000001c0)="acd023d9874230ee51a731cb1f32d0059f107a1166d22ef401df09001c22f621a0df4d2c33eff01fc01632b560bd6226c07145ae16c57dbbdd0a16fffa6f6f48c3f3ac2945eb43f1b52d626ac2d2324ee02d6ae0d9fa4a37280f0c18f117d67da61be0e1a70eea0189095fbd1f847c7bd3ecc65c7c1843aeab727ed1116a532d797b6303132f75bbfc87084396ae3300e54cec2fa3105d97517a5df3449f52d633c12ca1", 0xa4}, {&(0x7f0000000280)="5ad6259f8b5649a7e51ddf81b4ffd6309549003460bdc20b614fe14e137a74e67079282f38254d3e60c6fcaff7a715a23c229956188363b557545123c1a2b54780350c6ee1fef174e73b308bd55ae65ead0f682385e807d163be9d1c846dc3788033c633b2c34f2b9b29712e52953c908866ae1d895906f54addcfe7e06bd17a58383b1aa37cd15ef2", 0x89}], 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="b000000000000000170100000104000015db8112f3ee200c3bf38ed2dd7c0a27fd8c69517719e1f003a9abc1c1c0ff4df7bb78bed53e8d144c394a2e63758385a4002d23dfede04bb707bae4d61da00e6413323c926c0c7c859ebaaff4ad294b80a386671ac1d1013fab25fb74abfcc84e3b0eb8fe6a9909bfbabcc5c368eff7177752095abe2e8966ac1d19d2afaa13226259dd4f87c374d5f1ea1e394dc7c33f32658899c3000016d3f5afbe000000"], 0xb0}, 0x40) [ 393.908230][ T24] audit: type=1804 audit(1560830490.562:40): pid=11135 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir873885823/syzkaller.XPyJxc/85/memory.events" dev="sda1" ino=16856 res=1 04:01:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001340)={0x0, 0x0, 0x18}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xeca60000, 0xffffff7f01030000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x73}, 0x0) 04:01:30 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x8ce) unlink(&(0x7f0000000100)='./file0\x00') perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x9d41e83) 04:01:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr\x00\x00\x10\x00', 0x4002}) mkdir(0x0, 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4002, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x5, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x5, 0x10000, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x6, 0x0, 0x100000001, 0x2, 0x0, 0x7f, 0x4, 0x7, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8ab, 0x5}, 0x24800, 0x0, 0x5, 0x0, 0xffffffffffffffc1, 0x64}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xd) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x10) ioctl$TUNSETLINK(r0, 0x400454cd, 0x336) close(r0) openat$cgroup_subtree(r1, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) 04:01:30 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r5, 0x5, r4, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000400)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000002c0)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb, 0x20, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0xc, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000004c0)=r1, 0x4) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r5, 0x0) r6 = socket$kcm(0xa, 0x100000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) sendmsg$kcm(r6, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0, 0x263}, 0x200008c4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) close(0xffffffffffffffff) r7 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0faeba06ec400002339e00586f9835b3f00009148790000f85acc7c", 0x2e}], 0x1}, 0x0) 04:01:31 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r4, 0x5, r3, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 394.510320][T11258] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 04:01:31 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001380)={r0, &(0x7f0000001340)="7ffc6dc27b6586c4aa9ebffb48cfcdf39261076888f97ade968c98c86bf92fb10a8e651bd76776d016885de526555ef326662b642ef2f06dbd", 0x0}, 0x18) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000140)) recvmsg$kcm(r1, &(0x7f0000002240)={&(0x7f0000001f40)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001fc0)=""/132, 0x84}, {&(0x7f0000002080)=""/149, 0x95}, {&(0x7f0000002140)=""/68, 0x44}], 0x3, &(0x7f0000002200)=""/22, 0x16}, 0x1) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={&(0x7f00000013c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x1, 0x8}}, @var={0x1, 0x0, 0x0, 0xe, 0x4, 0x1}]}, {0x0, [0x5f, 0x5f, 0x30, 0x5f, 0x3e, 0x7f, 0x30]}}, &(0x7f00000022c0)=""/96, 0x49, 0x46}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.events\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1f, 0x4, 0x5b, 0x1, 0x8, 0xffffffffffffffff, 0x5, [], r2, 0xffffffffffffff9c, 0x0, 0x5}, 0x3c) openat$cgroup_procs(r4, &(0x7f0000001300)='cgroup.procs\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002380)={0x17, 0xff, 0x3f, 0x4, 0x41, r0, 0x6, [], r2, r3, 0x4, 0x2}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000300)="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", &(0x7f0000000180)=""/204}, 0x18) 04:01:31 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r4, 0x5, r3, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 394.754958][ T24] audit: type=1804 audit(1560830491.412:41): pid=11144 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir873885823/syzkaller.XPyJxc/85/memory.events" dev="sda1" ino=16856 res=1 [ 394.831380][ T24] audit: type=1800 audit(1560830491.482:42): pid=11144 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="memory.events" dev="sda1" ino=16856 res=0 04:01:31 executing program 1: r0 = socket$kcm(0xa, 0x6, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r4, 0x5, r3, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:31 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r4, 0x5, r3, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x10d, 0xb, &(0x7f0000000080)=r0, 0x4) [ 395.119497][T11258] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 04:01:31 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r4, 0x5, r3, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000700), 0x7, 0x0, 0xfffffffffffffe49}, 0x0) getpid() r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8919, &(0x7f0000000700)={'team0\x00\x00\x00\x00\x00\x00\x00\xf7\x00', @broadcast}) unlink(&(0x7f0000000100)='./file0\x00') ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 396.981529][T11301] IPVS: ftp: loaded support on port[0] = 21 [ 397.091053][T11301] chnl_net:caif_netlink_parms(): no params data found [ 397.186449][T11301] bridge0: port 1(bridge_slave_0) entered blocking state [ 397.194198][T11301] bridge0: port 1(bridge_slave_0) entered disabled state [ 397.201879][T11301] device bridge_slave_0 entered promiscuous mode [ 397.209782][T11301] bridge0: port 2(bridge_slave_1) entered blocking state [ 397.216979][T11301] bridge0: port 2(bridge_slave_1) entered disabled state [ 397.225972][T11301] device bridge_slave_1 entered promiscuous mode [ 397.298405][T11301] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 397.309333][T11301] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 397.335151][T11301] team0: Port device team_slave_0 added [ 397.375234][T11301] team0: Port device team_slave_1 added [ 397.455098][T11301] device hsr_slave_0 entered promiscuous mode [ 397.502630][T11301] device hsr_slave_1 entered promiscuous mode [ 397.613481][T11301] bridge0: port 2(bridge_slave_1) entered blocking state [ 397.620575][T11301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 397.628071][T11301] bridge0: port 1(bridge_slave_0) entered blocking state [ 397.635356][T11301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 397.698140][T11301] 8021q: adding VLAN 0 to HW filter on device bond0 [ 397.712763][ T8789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 397.721409][ T8789] bridge0: port 1(bridge_slave_0) entered disabled state [ 397.729890][ T8789] bridge0: port 2(bridge_slave_1) entered disabled state [ 397.738360][ T8789] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 397.789790][T11301] 8021q: adding VLAN 0 to HW filter on device team0 [ 397.800167][ T9385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 397.809237][ T9385] bridge0: port 1(bridge_slave_0) entered blocking state [ 397.816382][ T9385] bridge0: port 1(bridge_slave_0) entered forwarding state [ 397.836327][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 397.844967][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 397.852117][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 397.860473][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 397.869482][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 397.938381][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 397.954212][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 397.963670][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 397.974463][T11301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 397.991161][ T119] device bridge_slave_1 left promiscuous mode [ 397.998704][ T119] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.023296][ T119] device bridge_slave_0 left promiscuous mode [ 398.029478][ T119] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.724574][ T119] device hsr_slave_1 left promiscuous mode [ 399.788551][ T119] device hsr_slave_0 left promiscuous mode [ 399.848491][ T119] team0 (unregistering): Port device team_slave_1 removed [ 399.860612][ T119] team0 (unregistering): Port device team_slave_0 removed [ 399.872730][ T119] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 399.926754][ T119] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 400.033481][ T119] bond0 (unregistering): Released all slaves [ 400.143195][T11301] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 400.293753][ T119] Left network mode 04:01:37 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000680)={&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @remote, 'irlan0\x00'}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000380)="09ee08cca94c3c7e185c08857aab703d14727e4525d1599721b6f82165f094a70833983475caf491c59f5d71cddf9003328ff3553a675059962365f12d6112cf0ca161eabc1aa238436080a9c248021028e9869b9eb41e64f6ec3f2dcdcb525eb2862fa115e7cea6f9ddf6b81be7b348a2c118ccd2aedd99e69612f859fa1844c0b793c6693d9d4e2b7dffe8bed6f592366ee754c2fb888d7b413fa23679b70f7e5dd31e168c5ef1d59fbc39dafde94acd919d1125782aa966be89c5f9b68f11bd34c093da98fa9861b10499bd4d3cdcf32c9190305315ad9ca69239c3f2a6bf76139fa879722a494b62f33153d94264e09f67956e6eca92ce", 0xf9}, {&(0x7f0000000480)="20ee89f7064ed49e0f26be6a7cdeb64ce796ebada719562b5192540de2d7f92409e86ee9bd4839b1f8e92185324b282674fa2d242f6ee1b5bdcfd1e9dca26e455238b10b5c6acb0ef8b639af4cf153fb00e16410986322e7c3c3f252d6593b01bbb537221c64dd156d7c31288cf479a87e44e5344fb630db63d6a7cdf4f1986f76f126415deefb62fa3624601e8b963f1b39e7f89078be4dab405a3d5d8f9131255043010ebb0da104b7a9b1d9fce4c60a513a8910bd08f81a8a37", 0xbb}, {&(0x7f0000000200)="dacbf1d86882538d4b59d7e9e11aa07d35dcce5474bd9b24e1deacad47a5ab83135e77", 0x23}], 0x3, &(0x7f0000000580)=[{0x88, 0x10a, 0x5, "dbd8f8c15db5070b8de695583847e4b8980d4d0a410f828693d19b21c6fe555967e41d80a851e792f99d164fffa3518f94e704b292f4ce3d04e9ec7ff3cdabbecd867156e2ee0760368a868e02d4bd7cb3a85b53369ea9f26ec5cc1d9a4608647402bb1902becad28c99f3dbef4bdc350e"}, {0x40, 0x0, 0x8, "cb33ff410aaededeb6ac2cf34c959aa903e7c71353df8415de9912ebed67e7eba6a557686d6c5163654e07f458d151"}], 0xc8}, 0x4000) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='cgroup.stat\x00', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000000240)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x400000003, 0x10) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002b008163e45ae08700000001080f0000000000bc4cc91b4dd65b2f0580cb7023072a556d1c958c000000", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, 0x0, 0x4800) recvmsg(0xffffffffffffffff, 0x0, 0x100) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) 04:01:37 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r4, 0x5, r3, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:37 executing program 4: r0 = socket$kcm(0xa, 0x1, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xfffffffffffffe01, 0x7, 0x400, 0x189, 0x0, 0x7ff, 0x800, 0x3, 0x4, 0x100000000, 0x8000, 0x80000000, 0x8, 0xfffffffffffffffa, 0x6, 0x8, 0x101, 0x7c3c, 0x1000, 0x3, 0x4, 0x9, 0x9, 0x0, 0x200, 0x4, 0x800008, 0x4106, 0x6, 0x5, 0xfffffffffffffff8, 0x7, 0x5, 0x1, 0x5, 0x7, 0x0, 0x1000, 0x1, @perf_bp={&(0x7f0000000140), 0x2}, 0x8, 0x80000000, 0x0, 0x5, 0x80, 0x7f, 0x6}, r1, 0x5, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) openat$cgroup_type(r2, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_ro(r2, &(0x7f00000002c0)='pids.current\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[0x1a0ffffffff]}}, 0x80, 0x0}, 0x24000001) r3 = perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x5, 0x7, 0x9, 0x4, 0x0, 0x3f, 0x1000, 0x0, 0x8001, 0x7, 0x1000, 0x0, 0x7, 0x40, 0x1, 0xfff, 0x79c2ff73, 0x80000000, 0x9, 0x3ff, 0x40, 0x8d, 0x8, 0x3ff, 0x7, 0x5, 0x100, 0x80000000, 0x3, 0x98, 0x6, 0xffffffff, 0x5, 0x549e, 0x0, 0x9, 0x0, 0x6, 0x0, @perf_config_ext={0x1000, 0x1}, 0x20000, 0x10000, 0x0, 0x3, 0x6, 0x0, 0x80000001}, 0xffffffffffffffff, 0xb, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x7) 04:01:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r2 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000000)) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x100) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x20) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0xe000000, 'memory'}]}, 0xfa38) socketpair(0x12, 0x2, 0x10000, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65effe007c05e8fe55a1bc000500ac14140103000000050000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="2d31bb2c6dfe6ff81acabfd1b012ffa9261a914adbe1c6e0d21d5029eedf489d0db7148bebe772124327c0725a6cd0ebc6b6d8f28476cab97f965e35bd2356b4aa90b2276ff67c7dfcabfd686f4602642ca457836389c0b3d4cc074cc07412235ed5fd764bf061f7"], 0x69) openat$cgroup_ro(r3, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0)=0xfffffffffffffff8, 0x4) 04:01:37 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x8ce) unlink(&(0x7f0000000100)='./file0\x00') perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x9d41e83) 04:01:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000700), 0x7, 0x0, 0xfffffffffffffe49}, 0x0) getpid() r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8919, &(0x7f0000000700)={'team0\x00\x00\x00\x00\x00\x00\x00\xf7\x00', @broadcast}) unlink(&(0x7f0000000100)='./file0\x00') ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:01:38 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) r1 = socket$kcm(0xa, 0x2, 0x73) r2 = openat$cgroup_ro(r0, &(0x7f0000000380)='memory.swap.current\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000000)={r2, r2}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) socketpair(0x10, 0x0, 0x3, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000002c0)={'tunl0\x00', 0x1}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000200)='syzkaller0\x00') bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000280)={r4}) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x100000000000, &(0x7f0000000900)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f00000000c0)={r3}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 04:01:38 executing program 2: r0 = socket$kcm(0xa, 0x6, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r4, 0x5, r3, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 401.499076][T11331] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 04:01:38 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000680)={&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @remote, 'irlan0\x00'}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000380)="09ee08cca94c3c7e185c08857aab703d14727e4525d1599721b6f82165f094a70833983475caf491c59f5d71cddf9003328ff3553a675059962365f12d6112cf0ca161eabc1aa238436080a9c248021028e9869b9eb41e64f6ec3f2dcdcb525eb2862fa115e7cea6f9ddf6b81be7b348a2c118ccd2aedd99e69612f859fa1844c0b793c6693d9d4e2b7dffe8bed6f592366ee754c2fb888d7b413fa23679b70f7e5dd31e168c5ef1d59fbc39dafde94acd919d1125782aa966be89c5f9b68f11bd34c093da98fa9861b10499bd4d3cdcf32c9190305315ad9ca69239c3f2a6bf76139fa879722a494b62f33153d94264e09f67956e6eca92ce", 0xf9}, {&(0x7f0000000480)="20ee89f7064ed49e0f26be6a7cdeb64ce796ebada719562b5192540de2d7f92409e86ee9bd4839b1f8e92185324b282674fa2d242f6ee1b5bdcfd1e9dca26e455238b10b5c6acb0ef8b639af4cf153fb00e16410986322e7c3c3f252d6593b01bbb537221c64dd156d7c31288cf479a87e44e5344fb630db63d6a7cdf4f1986f76f126415deefb62fa3624601e8b963f1b39e7f89078be4dab405a3d5d8f9131255043010ebb0da104b7a9b1d9fce4c60a513a8910bd08f81a8a37", 0xbb}, {&(0x7f0000000200)="dacbf1d86882538d4b59d7e9e11aa07d35dcce5474bd9b24e1deacad47a5ab83135e77", 0x23}], 0x3, &(0x7f0000000580)=[{0x88, 0x10a, 0x5, "dbd8f8c15db5070b8de695583847e4b8980d4d0a410f828693d19b21c6fe555967e41d80a851e792f99d164fffa3518f94e704b292f4ce3d04e9ec7ff3cdabbecd867156e2ee0760368a868e02d4bd7cb3a85b53369ea9f26ec5cc1d9a4608647402bb1902becad28c99f3dbef4bdc350e"}, {0x40, 0x0, 0x8, "cb33ff410aaededeb6ac2cf34c959aa903e7c71353df8415de9912ebed67e7eba6a557686d6c5163654e07f458d151"}], 0xc8}, 0x4000) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='cgroup.stat\x00', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000000240)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x400000003, 0x10) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002b008163e45ae08700000001080f0000000000bc4cc91b4dd65b2f0580cb7023072a556d1c958c000000", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, 0x0, 0x4800) recvmsg(0xffffffffffffffff, 0x0, 0x100) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) 04:01:38 executing program 1: r0 = socket$kcm(0xa, 0x6, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r4, 0x5, r3, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:38 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x23, 0x0, 0x0) [ 401.744582][T11319] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 04:01:38 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r4, 0x5, r3, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:38 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000080)={'bridge0\x00', @random="01003a1e2410"}) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, 0x0) 04:01:38 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000540000005400000087feffff050000000000000203000000000000000300000d0000000003000000050000000e000000030000000b00000005000000040000000000000b05000000010000000100008507000000000000000100000006000000000000"], &(0x7f0000000100)=""/148, 0x6f, 0x94, 0x1}, 0x20) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r2 = gettid() r3 = openat$cgroup_procs(r1, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) socket$kcm(0x29, 0x5, 0x0) write$cgroup_pid(r3, &(0x7f0000000640)=r2, 0xfffffffffffffefb) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000680)={0x5, 0x70, 0x4, 0x7, 0x2, 0x2f13, 0x0, 0xec0, 0xa00, 0x1, 0x10001, 0x7, 0x3, 0x9, 0xfff, 0xfffffffffffffe00, 0x0, 0xffffffff, 0xd53, 0x7f, 0x8, 0x1, 0x8, 0x0, 0x4, 0x3d3, 0x1874, 0x81, 0x5, 0x100000001, 0x7, 0x7ff, 0x1e813022, 0x1f, 0xfe9, 0x800000000000000, 0x101, 0x1, 0x0, 0x200, 0x2, @perf_config_ext={0xfffffffffffffffc, 0xc3}, 0x2004, 0x3, 0xffff, 0x2, 0x10000, 0x0, 0x1f}, r4, 0x5, r4, 0x0) openat$cgroup_ro(r4, &(0x7f00000005c0)='memory.events\x00', 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000540)={&(0x7f0000000280)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000000480)=[{&(0x7f00000002c0)="4b5af89d01b244edc0c901cba21b0e2d419c22fc4e4f98ef6e633442535a250a7a184d697233965d51ff4749ce6c00361983f4a136", 0x35}, {&(0x7f0000000300)="415e859831271a3c5d1c796d4fe3b8243c9bfbc1a290802266e395edfe6acebf61d04f20663df485d5923d14e6ea2d3cfe0731f3fddabed1851421ba2cb380a9e87015b4a0f82d79606ffa0954d87d8b209ca888cade859ae92b3f8dd085f40af39023bfa3892a", 0x67}, {&(0x7f0000000380)="c8942a733cd7e5bc924591e49d91a070729911845428b880533e46ca6c275562e7e959d519542a8beeed03960589b20fea5afc0463b7dab0a7a24c6d6a2d1518d4118bfc691958c66efc4652f57fd8c24ba0dcdda8417c8663ace99a3739485dcb71a3fc4bf328af87a367e6804e73688d18da03447aba69fc985602dadac9f40eaecc834aa620af8a961c88362b3f9f3e2d25bfa104150124093b8bf91016dfa7f6efb2addcc1d63c41e2a6f63077d6999ab76c56948313f647895952897e153dee4669110eabea", 0xc8}], 0x3, &(0x7f00000004c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3ff}}, @ip_retopts={{0x20, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x6, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @generic={0x6807e535f018aceb, 0x4, "5ca2"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}], 0x68}, 0x880) close(r1) 04:01:38 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000000c0)) r1 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="2e00000027000500d25a80648c63940d0124fc000c00044002000000053582c137153e370300000000f01700d1bd", 0x2e}], 0x1}, 0x0) 04:01:38 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000380)="2e0000003500817ee45de087185082cf0300b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x0, 0x0) [ 402.274283][T11369] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 402.290940][T11370] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 402.309805][T11369] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 402.345172][T11370] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. 04:01:39 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000080)={'bridge0\x00', @random="01003a1e2410"}) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, 0x0) 04:01:39 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r3, 0x5, r2, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:39 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x8ce) unlink(&(0x7f0000000100)='./file0\x00') perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x9d41e83) 04:01:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0x4}}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x0, [{0xe, 0x3}, {0x9, 0x2}, {0x3, 0x1}, {0xf, 0x2}, {0x6, 0x2}, {0xa, 0x3}, {0xc, 0x1}, {0x9, 0x2}]}]}}, 0x0, 0xc9b25984f1ef7a2b, 0x0, 0x1}, 0xfffffd5e) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@var={0xf, 0x0, 0x0, 0xe, 0x5}, @func={0xd, 0x0, 0x0, 0xc, 0x1}]}, {0x0, [0x61, 0x7f, 0x0]}}, &(0x7f0000000200)=""/248, 0x39, 0xf8}, 0x20) 04:01:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) r0 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0x14, &(0x7f0000000040), 0x4) r1 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r1, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x3, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x5}, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0xfffffffffffffffb}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x2e7) getpid() bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={0x0, r1}, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) 04:01:39 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x6b, 0xa, 0xff00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7, 0xc3, &(0x7f0000000200)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x246, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x3}, 0x10}, 0x70) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) [ 402.557614][T11386] sctp: [Deprecated]: syz-executor.1 (pid 11386) Use of int in max_burst socket option deprecated. [ 402.557614][T11386] Use struct sctp_assoc_value instead 04:01:39 executing program 4: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000740)='cpuset.effective_cpus\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_sys\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000040)={'ifb0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0xfd, 0x8}, 0xc) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000006c0)={r6, &(0x7f0000000080), 0x0}, 0x18) 04:01:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='rdkb(\xa9n\x10M]nt\x00', 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r2, 0x0, 0x0}, 0x18) socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x1f, 0x67e, 0x6, 0x6, 0x80, r0, 0xf9b, [], 0x0, r0, 0x4, 0x5}, 0x3c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r1, 0x0, 0x5, &(0x7f00000000c0)='ppp1\x00'}, 0x30) perf_event_open(&(0x7f0000000340)={0x7, 0x70, 0xabf, 0x7, 0x401, 0x6, 0x0, 0xffffffffffffffff, 0x1, 0xd, 0x1f, 0x1, 0x3, 0x5, 0x3, 0x4, 0x2, 0x3, 0x0, 0x7, 0x7, 0x3, 0xffff, 0x4, 0x4, 0x0, 0xfffffffffffffffa, 0xf4, 0x7, 0x7fff, 0x5, 0x100000001, 0x0, 0x4, 0x2, 0x6, 0x80, 0xa4e, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x40, 0x4, 0x80000001, 0x7, 0x20, 0x729, 0xa1}, r3, 0xb, r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4) bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffff7c) [ 402.680304][T11386] sctp: [Deprecated]: syz-executor.1 (pid 11386) Use of int in max_burst socket option deprecated. [ 402.680304][T11386] Use struct sctp_assoc_value instead 04:01:39 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'hwsim0\x00', 0x920}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)={0x1, &(0x7f00000001c0)=[{0x9}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x03\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:01:39 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r3, 0x5, r2, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:39 executing program 1: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40106614, 0x0) openat$cgroup_type(r1, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) 04:01:39 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r3, 0x5, r2, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:39 executing program 0: r0 = socket$kcm(0xa, 0x2000001000000002, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.events\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f0000000200)=@in6={0xa, 0x4e24, 0x0, @mcast1}, 0x80, 0x0}, 0x0) [ 403.009620][T11404] device nr0 entered promiscuous mode 04:01:39 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000480)=0x5, 0x4) r0 = perf_event_open(&(0x7f00000005c0)={0x5, 0x70, 0x101, 0x4, 0x3, 0x0, 0x0, 0x5, 0xa00, 0x8, 0x1, 0x3, 0x9, 0x8, 0x1, 0x93b8, 0x7, 0xfff, 0x100000001, 0x7f3b79ff, 0x100000000, 0x0, 0x100000000, 0x800, 0x80, 0x3ff, 0x800, 0x8, 0x1029, 0xda, 0x0, 0xc070, 0x1, 0x3f, 0x49, 0x0, 0x7, 0xff, 0x0, 0xff, 0x0, @perf_config_ext={0xff, 0x8}, 0x80, 0x10001, 0x0, 0x3, 0x7fff, 0x0, 0xaaf3}, 0x0, 0xe, 0xffffffffffffff9c, 0xb) perf_event_open(&(0x7f0000000540)={0x7, 0x70, 0xdca, 0x8, 0xd, 0xadae, 0x0, 0x5623, 0x4000, 0x0, 0x3, 0x4, 0x8, 0x80000001, 0x9, 0x4, 0xfff, 0x3, 0x5, 0x6, 0x4fc4, 0x3, 0x4, 0xa55, 0x1000, 0x652e05cc, 0xe91, 0x100000000, 0x2, 0xffffffff80000000, 0x7ff, 0x4, 0x7, 0xaabc, 0x80000000, 0x6, 0x0, 0x6, 0x0, 0x8000, 0x0, @perf_config_ext={0x4, 0x800}, 0x14000, 0x20, 0x22cb606b, 0x7, 0x8, 0x5, 0x5}, 0x0, 0xd, r0, 0x8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000740)=0x6, 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000440)='memory.stat\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x3e6, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) recvmsg$kcm(r4, &(0x7f00000003c0)={&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/161, 0xa1}, {&(0x7f0000000100)=""/47, 0x2f}, {&(0x7f00000002c0)=""/139, 0x8b}], 0x3, &(0x7f0000000380)=""/28, 0x1c}, 0x20) sendmsg$tipc(r4, &(0x7f0000000780)={&(0x7f00000004c0)=@id={0x1e, 0x3, 0x0, {0x4e20, 0x1}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000640)="24c4b3e0656a13646d2b0923ab8342c79f757b9494a11651fa032cba3fa48e39409b5f7c775cffc2e131c19acb88dc0daf9420454a572c8a1ff57e979b627697d99c29ad798060073e1b5f8a3a9167f300fb3c29ae5f7b111fc05dd7fc5c5b70423e092bbe6892ff426d78f6120071d349cb800c71edc7b82e974d25ee403879edc7a721df3bbaf185678218d91ccb1e49aefe", 0x93}], 0x1, 0x0, 0x0, 0x80}, 0x40000) 04:01:40 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x8ce) unlink(&(0x7f0000000100)='./file0\x00') perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x9d41e83) 04:01:40 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r3, 0x5, r2, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:40 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x1b, 0x80006, 0x81, &(0x7f0000000880)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000008c0)={r1}) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x805, 0x0) setsockopt$sock_attach_bpf(r3, 0x84, 0x71, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={0x0, 0x0, 0x8}, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x0) r4 = gettid() perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x5de, 0x9, 0x7, 0x6, 0x0, 0x7, 0x2, 0x6, 0xfffffffffffffffb, 0xffff, 0xfff, 0x4, 0x200, 0x8000, 0x7fffffff, 0x4, 0x81, 0x6102, 0x8, 0x945a, 0x57, 0xff, 0x100, 0xff, 0x4, 0x7fff, 0xffffffff0000000, 0x5, 0x0, 0x1, 0x536, 0x24, 0x5, 0x2a, 0x8, 0x8d, 0x0, 0x8, 0x0, @perf_config_ext={0x9, 0x4}, 0x2, 0xffff, 0xfff, 0x5, 0x20, 0x80000000, 0x8000}, r4, 0x6, r2, 0x2) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) 04:01:40 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x81) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0x680, 0x10}, 0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x400000009, 0x3, 0xcc, 0x9, 0x8000000000000, r1}, 0x3c) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r3, &(0x7f0000000040), 0x0}, 0x18) r4 = gettid() perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x64, 0xd9e4, 0x3, 0x7, 0x0, 0x8, 0x40, 0xc, 0x81, 0xe5e, 0x2, 0x1f, 0x8001, 0x27f, 0x1, 0x9, 0x400, 0x9451, 0xfff, 0x89, 0x8, 0x3ff, 0x7, 0x3, 0xfffffffffffffff8, 0x40, 0x0, 0x9, 0x1, 0x0, 0x2, 0x1, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x7}, 0x4000, 0x5, 0x85, 0x9, 0x2, 0x6, 0x10000}, r4, 0x0, r0, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r2}, 0x10) 04:01:40 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000001c008104e00f80ecdb4cb90402c804a012000000040090fb120001000e10da1b40d819a9060015000000", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x8, 0x0, 0x2, 0x80000000, 0x0, 0x1ff, 0x0, 0x4, 0x2, 0x3, 0x616, 0x101, 0x3ff, 0x4, 0xe000000000000000, 0xfffe000000000000, 0xfffffffffffffffe, 0x2, 0x1, 0x800, 0xdbab, 0xd73, 0x20, 0x9, 0x1222, 0x4, 0x1, 0x100000001, 0x6465, 0x1ff, 0x0, 0x3, 0x8000, 0x80, 0xfff, 0x1, 0x0, 0x122, 0x1, @perf_config_ext={0x7ff, 0xffffffffffffffe1}, 0x1000, 0x7, 0x4, 0x9, 0x7, 0x2850, 0x3}, r3, 0x9, r0, 0xb) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) 04:01:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xf, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="8500000006000000bc00000000000000950000081b0000fbce951a3f94a1695351074a64fda100"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0xffffffffffffffff, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000140), 0x10}, 0x70) 04:01:40 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x1b, 0x80006, 0x81, &(0x7f0000000880)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000008c0)={r1}) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x805, 0x0) setsockopt$sock_attach_bpf(r3, 0x84, 0x71, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={0x0, 0x0, 0x8}, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x0) r4 = gettid() perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x5de, 0x9, 0x7, 0x6, 0x0, 0x7, 0x2, 0x6, 0xfffffffffffffffb, 0xffff, 0xfff, 0x4, 0x200, 0x8000, 0x7fffffff, 0x4, 0x81, 0x6102, 0x8, 0x945a, 0x57, 0xff, 0x100, 0xff, 0x4, 0x7fff, 0xffffffff0000000, 0x5, 0x0, 0x1, 0x536, 0x24, 0x5, 0x2a, 0x8, 0x8d, 0x0, 0x8, 0x0, @perf_config_ext={0x9, 0x4}, 0x2, 0xffff, 0xfff, 0x5, 0x20, 0x80000000, 0x8000}, r4, 0x6, r2, 0x2) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) 04:01:40 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r3, 0x5, r2, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x10, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00'}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r3, &(0x7f0000000040)="0a2b376f4949f965f3ac97f70758becac31475f3033d1926df85788f7274dc516f199c2d3aa0aea12378ff075f11", 0x0}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x8581302, 0x0) recvmsg$kcm(r3, &(0x7f0000005940)={&(0x7f00000055c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000005880)=[{&(0x7f0000005640)=""/69, 0x45}, {&(0x7f00000056c0)=""/145, 0x91}, {&(0x7f0000005780)=""/171, 0xab}, {&(0x7f0000005840)=""/61, 0x3d}], 0x4, &(0x7f00000058c0)=""/83, 0x53}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000005980)={0x14, 0x5, 0x80, 0x100000001, 0x10, r1, 0x80000001, [], r5, r3, 0x4, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) unlink(&(0x7f0000000200)='./file0\x00') sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[], 0x0) r6 = socket$kcm(0xa, 0x2, 0x11) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000240)={r0, r2}) setsockopt$sock_attach_bpf(r6, 0x29, 0x33, &(0x7f0000000040), 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000140)={r0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, r3, 0x0, 0x1, &(0x7f00000004c0)='\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0xfffffffffffffffa, 0xc5d6, 0x7, 0x7ff, 0x0, 0x1000, 0xa00, 0x4, 0x388, 0x1, 0x4, 0x8001, 0xffffffff00000000, 0xffffffff, 0x800, 0x7c7, 0x80000000, 0x2, 0x0, 0x6, 0x20, 0x8001, 0x1000, 0x3, 0x8001, 0x7ff, 0x1, 0x3, 0x8, 0x3, 0x1, 0x7ff, 0x4, 0xe95, 0x4c09, 0x74d5, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000400), 0x2}, 0x8004, 0xffffffffffffff37, 0x20, 0x7, 0x4, 0x5, 0x100}, r7, 0x2, r3, 0x0) 04:01:40 executing program 5: socket$kcm(0x10, 0x2, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000600)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000740)="6b73225edd6eb05e5a217a1a315e9f8a984b08e5e900e1edceda5b63a9b8d0edf630f5e433b2ed688fade98ea8b3bb209888ac50977f42b11138b8fca32963c75f60233892d964d65b3b03c3faf28819ddf0c01374fb0c60eff5c665c84705d6fd6b3977f3647b824098801d40", 0x6d}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="230000004a0081aee4050c00000f00000a8bc36f7d79ce3263dac37b7403c609000000", 0x23}], 0x1}, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{0x0}, {0x0}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xff, 0x4, 0x401, 0x305, 0x0, 0x0, 0x100, 0x9, 0xfffffffffffffffb, 0x6, 0x40, 0x5b12, 0x2, 0x0, 0x81, 0x101, 0x0, 0x4, 0x6, 0xfffffffffffffff9, 0x0, 0x3f, 0x0, 0x10000, 0x5, 0xa4c, 0x101, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1ff, 0x0, 0x1c6, 0x8, 0x0, 0x0, 0x0, @perf_config_ext={0x81}, 0x8, 0x8, 0x6b68, 0x6, 0x3, 0x1e, 0xc5ae}, r1, 0x9, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000680)=ANY=[@ANYBLOB="0200009dc706ec60f986a6000000000086e02a77947ca0ee6406e20800000000000000d37bab295be4221c37a0d817081174808107dfabf8511ee1ca6c72109695f739db4000f16e2893d9bcc01c3cdf414629dda7c882bdfe92402620b8beeeac16db2b6e64061712273c4ee4d6bce1a5511ed2b7097c7032000000000000"]) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x0, 0x4, 0x0, 0xf1a}, 0x2c) r3 = socket$kcm(0xa, 0x2, 0x73) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0xfffffffffffffd16, 0x0, 0x236, 0x0, 0xffffffffffffffbb, 0x40004}, 0x0) socketpair(0x0, 0x0, 0x100000000000, &(0x7f0000000900)) openat$cgroup_procs(r2, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000c00)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00`\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 04:01:40 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r3, 0x5, r2, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:40 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000040)=r4, 0x61) sendmsg$tipc(r3, &(0x7f0000000480)={&(0x7f0000000000)=@name, 0x10, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000080)='cpuset.sched_load_balance\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x70, 0x9d, 0x7, 0xff, 0xffff, 0x0, 0x0, 0x8040, 0xa, 0x100, 0x4, 0x0, 0x4, 0x0, 0x0, 0x20, 0x4, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x6d6c00, 0x0, 0x9, 0x6, 0x0, 0x7, 0x9, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x7, 0x2, 0x1, 0xe17}, r5, 0x3, r0, 0x1) write$cgroup_int(r6, &(0x7f00000003c0), 0x12) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, r1, 0x0, 0x1, &(0x7f0000000280)='\x00'}, 0x30) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x5, 0x40, 0x80, 0xd2, 0x0, 0x8, 0x10200, 0x2, 0x8001, 0x4, 0x3f, 0x8001, 0x0, 0x0, 0x9, 0x3, 0x3f, 0xffffffff00000001, 0xc4, 0x5, 0xfffffffffffff001, 0x6, 0x762e, 0x10000, 0x1, 0xc004, 0x1fe5, 0x6, 0x81, 0x1, 0x3, 0x7fe51ac7, 0x2, 0x1, 0xffff, 0xf41, 0x0, 0x8, 0x0, @perf_config_ext={0x30, 0xde}, 0x1, 0x5, 0x7ff, 0xb, 0x6, 0xc7b2, 0x401}, r7, 0x7, r4, 0x2) close(r5) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 404.290735][T11482] device lo entered promiscuous mode 04:01:41 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x89f5, &(0x7f0000000000)={'ip6gre0\x00'}) socket$kcm(0x29, 0x2, 0x0) 04:01:41 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000080), 0x4d) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000000)="7b697cf3e52890b7e211", 0xa}], 0x1}, 0x0) 04:01:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x10, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00'}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r3, &(0x7f0000000040)="0a2b376f4949f965f3ac97f70758becac31475f3033d1926df85788f7274dc516f199c2d3aa0aea12378ff075f11", 0x0}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x8581302, 0x0) recvmsg$kcm(r3, &(0x7f0000005940)={&(0x7f00000055c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000005880)=[{&(0x7f0000005640)=""/69, 0x45}, {&(0x7f00000056c0)=""/145, 0x91}, {&(0x7f0000005780)=""/171, 0xab}, {&(0x7f0000005840)=""/61, 0x3d}], 0x4, &(0x7f00000058c0)=""/83, 0x53}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000005980)={0x14, 0x5, 0x80, 0x100000001, 0x10, r1, 0x80000001, [], r5, r3, 0x4, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) unlink(&(0x7f0000000200)='./file0\x00') sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[], 0x0) r6 = socket$kcm(0xa, 0x2, 0x11) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000240)={r0, r2}) setsockopt$sock_attach_bpf(r6, 0x29, 0x33, &(0x7f0000000040), 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000140)={r0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, r3, 0x0, 0x1, &(0x7f00000004c0)='\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0xfffffffffffffffa, 0xc5d6, 0x7, 0x7ff, 0x0, 0x1000, 0xa00, 0x4, 0x388, 0x1, 0x4, 0x8001, 0xffffffff00000000, 0xffffffff, 0x800, 0x7c7, 0x80000000, 0x2, 0x0, 0x6, 0x20, 0x8001, 0x1000, 0x3, 0x8001, 0x7ff, 0x1, 0x3, 0x8, 0x3, 0x1, 0x7ff, 0x4, 0xe95, 0x4c09, 0x74d5, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000400), 0x2}, 0x8004, 0xffffffffffffff37, 0x20, 0x7, 0x4, 0x5, 0x100}, r7, 0x2, r3, 0x0) 04:01:41 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r3, 0x5, r2, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:41 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x9, 0x100000000000913, 0x6}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x41b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f000000d540)={&(0x7f000000c4c0)=ANY=[@ANYBLOB="9feb010018000000000000004b0000004b000000090000000e0000000500000f03000000050000007f000000e9699c08ab3100000500000023b2000007000000050000000800000005000000040000000400000002000000010000000000000052760000cd4b0000003030305f"], 0x0, 0x6d}, 0x20) recvmsg$kcm(r0, &(0x7f0000004680)={&(0x7f0000004480)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000045c0)=[{&(0x7f0000004500)=""/157, 0x9d}], 0x1, &(0x7f0000004600)=""/77, 0x4d}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000004740)={0x11, 0x3, &(0x7f0000000300)=@raw=[@jmp={0x5, 0x2, 0xf, 0x7, 0x3, 0xfffffffffffffff8}, @jmp={0x5, 0x2, 0xb, 0xf, 0x9, 0x18, 0xfffffffffffffff0}, @exit], &(0x7f0000000540)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000680)=""/4096, 0x41000, 0x2, [], r2, 0x0, r0, 0x8, &(0x7f00000046c0)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000004700)={0x2, 0x2, 0x729, 0x7}, 0x10}, 0x70) bpf$MAP_CREATE(0x0, &(0x7f000000d580)={0x13, 0x9, 0x25ee, 0x6, 0x10, r0, 0x2603, [], 0x0, r1, 0x5}, 0x3c) r3 = openat$cgroup_ro(r1, &(0x7f00000005c0)='pids.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000600)=0xffffffffffffffff, 0x2ba) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000640)=r4) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0xe, 0x4, &(0x7f0000001680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xcd}, [@alu={0x4, 0x5c, 0xb, 0xb, 0x7, 0xffffffffffffffff, 0x1}]}, &(0x7f00000016c0)='GPL\x00', 0x81, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xe, r3, 0x8, &(0x7f0000001700)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000001740)={0x1, 0x0, 0xa064, 0x1}, 0x10}, 0x70) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000200)=0x81) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f00000000c0), 0x0}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={r1, 0x10, &(0x7f0000000280)={&(0x7f0000000380)=""/131, 0x83, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=r5, 0x4) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000340)={r0, &(0x7f0000000200), 0x0}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r0, &(0x7f00000000c0)="58695752322e685a302983535c7e51e092983c8484e51b2438db6df31c64fccffdf7bfc02e19e267e521af83301cf64d14aad3b017563b048355ab11e9289c52574515101df5a455c415682b211f3e66dd984b4ce250813470ce8e3c4d26", 0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="8500000015400047db000001ef003e777cb0270a5cec66ddab4cd5e594df59725e6adf3c2cecc8c37453455de66b"], 0x0, 0x16c, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x11, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x3, 0x3, 0x1, 0x100000001}, 0x10}, 0x70) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$TUNSETLINK(r6, 0x400454cd, 0x301) 04:01:41 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x2, 0x4, 0x2, 0xaa5, 0x0, 0x1}, 0x3c) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) openat$cgroup(r1, &(0x7f0000000440)='syz0\x00', 0x200002, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x5, 0x4, 0x2, 0x0, r0, 0x9f6, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r2, &(0x7f0000000100)="47e87874f46ce04b8a283d15a095263c5a357f4460121e2f88ade6cf8ac2601773348b0769aee02e070abb184d856052bfaf9eec1a542a99e5752f34702d68e40fffbafab5df34e7c9adff320e0a364e4685629a98e22293fa8be0af04fe316d2df3c6990957816af7ca646c2a3533834bd777395686c4313e5f84198ad7937f20ea421cacd12a856cf710f3492855c2a51cfaa00e924790490ff5db6671fe5e6cbf7e5e46b859fa165e54c05b28c0a2e2869a6eb22fe812724026c280544ec19e616b166c296cc35eec6d14492f369691dcb4a22c6e126578bdc7287fd57b7b497f", 0x0}, 0xffffffffffffff12) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000080)="0181e0ecab3ba4e21708dede05fc82272edeb2a71997d15b10e661dcfc6cc080e3a0ec310513ec55af53a8ce83b340509ce98c78193a154b8c71ab", &(0x7f0000000200)="cb9d9d96ec35e49638035b0048e139771680ab620b4380b3f7a9e272f1f7bbfccdee0fe36c498282d9f334f1dab265921a707f2d8ddbf21a1d8391c837a94c2d284b98b6f5d6b1a0c087378388a6bfe54debfe5c9e12c4e3762d4df8a336eb70e8950640ec0cea1ee62fc4232e13d18212c1f78f4bdda930ac0e1dc632c8b6fd9a5de37032c6d3879580ab862eaa21b79aaae54db5f6e7da215827a5459a43651235873aa1da1094fdf845bdafd2ea73122ea4dac560f4417f6ec0a1998b9cfe85", 0x4}, 0x20) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001bd00)={&(0x7f000001b980)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f000001bc00)=[{&(0x7f000001ba00)=""/207, 0xcf}, {&(0x7f000001bb00)=""/126, 0x7e}, {&(0x7f000001bb80)=""/82, 0x52}], 0x3, &(0x7f000001bc40)=""/150, 0x96}, 0x2100) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f000001bd40)='rdma.current\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r2, 0x28, &(0x7f0000000340)}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f000001bd80)={0x16, 0x1, 0x9, 0x9, 0x40, r2, 0x6, [], r3, r5, 0x1, 0x5}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r6, &(0x7f0000000000)="bbfe91e233d3c549ae5b9618019d3e37c77b9d6e772f58b7c0875608a8481d5c6327a7565c409368e9e5b7c7e01f088081b0"}, 0x10) 04:01:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x9d41e83) 04:01:41 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r3, 0x5, r2, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:41 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)='ip6tnl0\x00') r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x9}, 0x20) sendmsg$kcm(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfddd, &(0x7f00000001c0), 0x12f}, 0x0) r4 = socket$kcm(0x11, 0x0, 0x300) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000a010000000000000000000095000000040000ec"], 0x0, 0x5c0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000440)=r5, 0x4) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$kcm(r6, &(0x7f0000000280)={&(0x7f00000007c0)=@pptp={0x18, 0x2, {0x2, @multicast1}}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)="3338b681f998d7e10d0f3efb80f7bc76c5dbf108901d162cfa7201a4590fb0c14fa2e944c973a8a0ecbe8ef847e347cb6ff922fe78ca89d16b303a111372312b71f4e2ef6926a2e119d51328d6792c32cdee9d5e939eea953e55ce8fb055ae0d2e55ae63497095fffd04d1a4c4334384b7e2839105f187d35b6b83691c5ffaadb45d1674f5555c4fdd336202081f66ae2908b82d63da158c40eeda3d998683ae2b78c00f149771b83d91d13d103b38e9bf4cf5739bf99b4fc6241a9a0826f9a0b6a4c33ac954095f6c76e297fed690c40764b040dcc5013fe20b67e7440606f9f04199bb533b1612731ef2bd7a66", 0xee}], 0x1}, 0x40000) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) sendmsg(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="2800000000000000190100000000ba101be9c018490ae98bb1f7a90ce4efec7892000000000000008fd6b4f28b88fc5458eb49ff8de9081606cd671a412e1720b88f7630074a910f8b2325e27f8a481d1671a2dcc80f962028e4519a580eae48cd7c8a33f2702ce5d4f635f27b3f8ffa2df735e306481e08458b7b6c697715fab00f5acee295a7b4890b27a7009c3da23505c5c39c9b9900000000000000"], 0x9e}, 0x20000040) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r6, &(0x7f0000000000)={&(0x7f0000000380)=@in={0x2, 0x4e21, @multicast2}, 0x80, 0x0}, 0xfd00) r7 = getpid() perf_event_open(0x0, r7, 0x1, 0xffffffffffffffff, 0x1) write$cgroup_subtree(r6, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x1da) r8 = socket$kcm(0x2b, 0x7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) recvmsg(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000300)=""/121, 0x79}, {&(0x7f0000000580)=""/228, 0xe4}, {&(0x7f0000000200)=""/11, 0xb}, {&(0x7f0000000280)}], 0x4}, 0x2001) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x1f, 0x0, 0x1, 0x100, 0x0, 0x9, 0x10c, 0x2, 0x5, 0xffff, 0x400, 0x80000001, 0xfff, 0x81, 0x3, 0x101, 0x4, 0x800, 0x1, 0x89, 0x2, 0x100000000, 0x6, 0x7, 0x200, 0x0, 0x1, 0xa63f, 0xffff, 0x7, 0x200, 0xffff, 0x101, 0x7, 0x6, 0x0, 0x0, 0xc9, 0x2, @perf_config_ext={0x3, 0x40}, 0x20000, 0x2d5, 0x0, 0xb, 0x1, 0x3, 0x3}, r7, 0x3, r2, 0x1) [ 405.504870][T11525] ================================================================== [ 405.513337][T11525] BUG: KASAN: use-after-free in kfree_skb_list+0x5d/0x60 [ 405.520386][T11525] Read of size 8 at addr ffff8880891d8e00 by task syz-executor.4/11525 [ 405.528727][T11525] [ 405.531076][T11525] CPU: 0 PID: 11525 Comm: syz-executor.4 Not tainted 5.2.0-rc2+ #23 [ 405.539100][T11525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.549353][T11525] Call Trace: [ 405.552663][T11525] dump_stack+0x172/0x1f0 [ 405.557010][T11525] ? kfree_skb_list+0x5d/0x60 [ 405.561707][T11525] print_address_description.cold+0x7c/0x20d [ 405.567792][T11525] ? kfree_skb_list+0x5d/0x60 [ 405.572493][T11525] ? kfree_skb_list+0x5d/0x60 [ 405.577193][T11525] __kasan_report.cold+0x1b/0x40 [ 405.582149][T11525] ? kfree_skb_list+0x5d/0x60 [ 405.586865][T11525] kasan_report+0x12/0x20 [ 405.591240][T11525] __asan_report_load8_noabort+0x14/0x20 [ 405.596888][T11525] kfree_skb_list+0x5d/0x60 [ 405.601517][T11525] ip6_fragment+0x1ef4/0x2680 [ 405.606330][T11525] ? ip6_forward_finish+0x570/0x570 [ 405.611586][T11525] ? ip6_forward+0x3870/0x3870 [ 405.616435][T11525] ? ip6_mtu+0x2e6/0x460 [ 405.620889][T11525] ? lock_downgrade+0x880/0x880 [ 405.625766][T11525] ? ip6_mtu+0x2eb/0x460 [ 405.630042][T11525] ? __rcu_read_unlock+0x72/0x130 [ 405.635184][T11525] __ip6_finish_output+0x577/0xaa0 [ 405.640334][T11525] ip6_finish_output+0x38/0x1f0 [ 405.645201][T11525] ip6_output+0x235/0x7f0 [ 405.649551][T11525] ? ip6_finish_output+0x1f0/0x1f0 [ 405.654686][T11525] ? __ip6_finish_output+0xaa0/0xaa0 [ 405.659994][T11525] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 405.665632][T11525] ip6_local_out+0xbb/0x1b0 [ 405.670157][T11525] ip6_send_skb+0xbb/0x350 [ 405.674594][T11525] ip6_push_pending_frames+0xc8/0xf0 [ 405.679902][T11525] rawv6_sendmsg+0x2993/0x35e0 [ 405.684700][T11525] ? rawv6_getsockopt+0x150/0x150 [ 405.689825][T11525] ? aa_profile_af_perm+0x320/0x320 [ 405.695099][T11525] ? tomoyo_check_inet_address+0xf7/0x740 [ 405.700933][T11525] ? tomoyo_unix_entry+0x5d0/0x5d0 [ 405.706184][T11525] ? iov_iter_init+0x8b/0x220 [ 405.710888][T11525] ? iov_iter_init+0x99/0x220 [ 405.715691][T11525] ? ___might_sleep+0x163/0x280 [ 405.720557][T11525] ? __might_sleep+0x95/0x190 [ 405.725265][T11525] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 405.730887][T11525] inet_sendmsg+0x141/0x5d0 [ 405.735409][T11525] ? inet_sendmsg+0x141/0x5d0 [ 405.740102][T11525] ? ipip_gro_receive+0x100/0x100 [ 405.745199][T11525] sock_sendmsg+0xd7/0x130 [ 405.749746][T11525] ___sys_sendmsg+0x803/0x920 [ 405.754472][T11525] ? copy_msghdr_from_user+0x430/0x430 [ 405.760042][T11525] ? lock_downgrade+0x880/0x880 [ 405.764924][T11525] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.771187][T11525] ? kasan_check_read+0x11/0x20 [ 405.776084][T11525] ? __fget+0x381/0x550 [ 405.780273][T11525] ? __fget_light+0x1a9/0x230 [ 405.784975][T11525] ? __fdget+0x1b/0x20 [ 405.789056][T11525] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 405.795401][T11525] __sys_sendmsg+0x105/0x1d0 [ 405.800004][T11525] ? __ia32_sys_shutdown+0x80/0x80 [ 405.805239][T11525] ? __sys_sendmsg+0x2f/0x1d0 [ 405.809938][T11525] __x64_sys_sendmsg+0x78/0xb0 [ 405.814730][T11525] do_syscall_64+0xfd/0x680 [ 405.819255][T11525] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.825170][T11525] RIP: 0033:0x4592c9 [ 405.829084][T11525] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 405.848786][T11525] RSP: 002b:00007f0222529c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 405.857216][T11525] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 405.857249][T11525] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000006 [ 405.857257][T11525] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 405.857265][T11525] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f022252a6d4 [ 405.857283][T11525] R13: 00000000004c6f76 R14: 00000000004dc0b0 R15: 00000000ffffffff [ 405.897618][T11525] [ 405.900125][T11525] Allocated by task 11525: [ 405.906829][T11525] save_stack+0x23/0x90 [ 405.914925][T11525] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 405.920619][T11525] kasan_slab_alloc+0xf/0x20 [ 405.925228][T11525] kmem_cache_alloc_node+0x131/0x710 [ 405.930523][T11525] __alloc_skb+0xd5/0x5e0 [ 405.934859][T11525] __ip6_append_data.isra.0+0x2a24/0x3640 [ 405.934873][T11525] ip6_append_data+0x1e5/0x320 [ 405.934887][T11525] rawv6_sendmsg+0x1467/0x35e0 [ 405.934909][T11525] inet_sendmsg+0x141/0x5d0 [ 405.954622][T11525] sock_sendmsg+0xd7/0x130 [ 405.959051][T11525] ___sys_sendmsg+0x803/0x920 [ 405.963747][T11525] __sys_sendmsg+0x105/0x1d0 [ 405.963761][T11525] __x64_sys_sendmsg+0x78/0xb0 [ 405.963777][T11525] do_syscall_64+0xfd/0x680 [ 405.963792][T11525] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.963797][T11525] [ 405.963803][T11525] Freed by task 11525: [ 405.963830][T11525] save_stack+0x23/0x90 [ 405.983562][T11525] __kasan_slab_free+0x102/0x150 [ 405.983575][T11525] kasan_slab_free+0xe/0x10 [ 405.983586][T11525] kmem_cache_free+0x86/0x260 [ 405.983599][T11525] kfree_skbmem+0xc5/0x150 [ 405.983611][T11525] kfree_skb+0xf0/0x390 [ 405.983690][T11525] ip6_tnl_start_xmit+0x925/0x1ce0 [ 405.983721][T11525] dev_hard_start_xmit+0x18a/0x950 [ 406.029928][T11525] __dev_queue_xmit+0x2a8e/0x36b0 [ 406.035005][T11525] dev_queue_xmit+0x18/0x20 [ 406.039608][T11525] neigh_direct_output+0x16/0x20 [ 406.044769][T11525] ip6_finish_output2+0x1034/0x2550 [ 406.050076][T11525] ip6_fragment+0x1ebb/0x2680 [ 406.054773][T11525] __ip6_finish_output+0x577/0xaa0 [ 406.059899][T11525] ip6_finish_output+0x38/0x1f0 [ 406.064756][T11525] ip6_output+0x235/0x7f0 [ 406.069086][T11525] ip6_local_out+0xbb/0x1b0 [ 406.073604][T11525] ip6_send_skb+0xbb/0x350 [ 406.078019][T11525] ip6_push_pending_frames+0xc8/0xf0 [ 406.083414][T11525] rawv6_sendmsg+0x2993/0x35e0 [ 406.088184][T11525] inet_sendmsg+0x141/0x5d0 [ 406.092703][T11525] sock_sendmsg+0xd7/0x130 [ 406.097119][T11525] ___sys_sendmsg+0x803/0x920 [ 406.102142][T11525] __sys_sendmsg+0x105/0x1d0 [ 406.106737][T11525] __x64_sys_sendmsg+0x78/0xb0 [ 406.111506][T11525] do_syscall_64+0xfd/0x680 [ 406.116009][T11525] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.122697][T11525] [ 406.125030][T11525] The buggy address belongs to the object at ffff8880891d8e00 [ 406.125030][T11525] which belongs to the cache skbuff_head_cache of size 224 [ 406.139629][T11525] The buggy address is located 0 bytes inside of [ 406.139629][T11525] 224-byte region [ffff8880891d8e00, ffff8880891d8ee0) [ 406.152727][T11525] The buggy address belongs to the page: [ 406.158373][T11525] page:ffffea0002247600 refcount:1 mapcount:0 mapping:ffff88821b6f6540 index:0x0 [ 406.167485][T11525] flags: 0x1fffc0000000200(slab) [ 406.172460][T11525] raw: 01fffc0000000200 ffffea000244b748 ffffea00024f8f88 ffff88821b6f6540 [ 406.181236][T11525] raw: 0000000000000000 ffff8880891d8040 000000010000000c 0000000000000000 [ 406.189999][T11525] page dumped because: kasan: bad access detected [ 406.196404][T11525] [ 406.198725][T11525] Memory state around the buggy address: [ 406.204355][T11525] ffff8880891d8d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 406.212591][T11525] ffff8880891d8d80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 406.220762][T11525] >ffff8880891d8e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 406.229015][T11525] ^ [ 406.233100][T11525] ffff8880891d8e80: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 406.241361][T11525] ffff8880891d8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 406.249437][T11525] ================================================================== 04:01:42 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@can, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/55, 0x37}, {&(0x7f00000000c0)=""/73, 0x49}, {&(0x7f0000000140)=""/117, 0x75}, {&(0x7f0000000280)=""/69, 0x45}], 0x4, &(0x7f0000000300)=""/181, 0xb5}, 0x40000063) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x80) 04:01:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000d40)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000d80)=0xffffffff00000000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f6477505f2b2638e9a2f5b6e00080089ea010000000000f109a7", 0x0, 0xfffffffffffffffe}, 0x26) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x9f) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg(r2, &(0x7f0000000d00)={&(0x7f0000000140)=@ethernet={0x6, @remote}, 0x80, &(0x7f0000000840)=[{&(0x7f00000001c0)="5b9bab00a6b4c9c189a5009381df9b575ee096f11478302ab1b659118440220a316921ec7d1700a606ec5004bda8a8f1f9908565145096f7fe8206a6c646ffeb9ef45b4051ea0ddd20b5753ef5d180c0a7eca1d8fb94fd19", 0x58}, {&(0x7f0000000240)="f061b45fa913b32bdf410f553625434b0820f8d4496bb8672d", 0x19}, {&(0x7f0000000340)="e7641e37d02b3d2c1cc3d03ea2748509405507a3a54aec8a493c04948d694db094a4ea39cf59651e39aa636ecfc89aa86c6658abcb22cc8b916d8945577443412d7de89ef8d6f809e40d6d97d01f818bae10dd3d34af9c9c447797918a5f6f7acbbcb85957cb9ae2e299f64f6ef897f302b4e585c11264501386c720c850956857b1e1cd17262aa4e62cf73d632f8b8007251e68a98c0a0ffffea135ee65b8e951fc2b8010277ed8e0150eb3816426a6d50476164d5204aee2accbf4bdea0284eb41210f24f02802a425342e078bbafd0928", 0xd2}, {&(0x7f0000000440)="b9d6f43f00869872cbdbac373f45c02580956fd9ff9158d1ecc8e28bcb97fa197e03fde313384f23d76894911856c5b4446d5d0267a5de4788464f74015fa9d9edffd34298fe24a78723c60d0e7a66a3c9faad150e1893680a9f89967b8f3702d95326299606f23dd462d65f3f553f8f55dec5974beb184c8dbe11732f697da32197bc9041766a0659b474870e357432151565afe14904104de430f8bb0a90e582d1536b9f032ccfa6e5d0bdd38eed33c91209a1af920e3bbde55c5c1ff817069ad3b489d73d317102df3fbe3395ea8d18828902599d8fbdd32b35b59d69d834c446f49f1cb28438b270", 0xea}, {&(0x7f0000000280)="1c58ce9048c4433bbf1df0c85e4433f385c1a5472bcecb3667ac1fddae93667ae97e20a0912f4fdaab873e26949c35dc40d941051cedceba96826c491df3934224a87f5aa10e2f4c3425cd3bd70e9a7d685a825dec5e5793ec0af3981e3e4df608057020eceb7136f33f76919400e7c384b95b744aba5401aff18efc07", 0x7d}, {&(0x7f0000000540)="957f99b639fc3adcc1e5344d2999fca38a5e5f872a273050b219691e5fa576916639a8e04db37f608018de8b63f4c98eb2dbbf1ea05fa1b376d76d5dfe78d4e2f4d9ea4aa00bfdcf0ed2f4694f5137167f5a0fff54a4772bf4ea827efe13d945bef0edfea4b8c2f6", 0x68}, {&(0x7f00000005c0)="f38e8e4f9b70c9992ab5c7019aea27ee2d4ef6f26df7c1a4cfa7298e966c217dcfa572002502dd6b32e05b4b0b5b876d8631b5f614c19de8d0ec11fac274cadbaa5db5b885e2930a2ab0902df00f9aed", 0x50}, {&(0x7f0000000640)="99605d5101bfddfc02dd6e17e793f0f2f7095872fb830883bbfa41f10fd0bfc34fbc8d8c4baa5f90848bc1f496ae9628661a2ef2be47142bebf8cf660a513dcc402c83aa3af1e423bae55a81dd57df9383fd63aefe9cb41d0f732ce5bc9ce1bab152693fa2cde52d8ed62ff9a1af6dd4a6d63b4027a8b3904c7e8527a00252700344f455a5b9ccb56dba46dee10de795f4631af6b33d70c9a103c24ba65740af908d550eafedc5ecef624441774090724243c2621185bb34fa386175670467159d8510a3dfaf8f64a84b9efb75d25d47b2fcfedc43752213c891c23bc862a063468f1235a6", 0xe5}, {&(0x7f0000000740)="0add19974552e28ed5ee2cc738bb8475e837f3e6cdbbea1ce84e6f70ab8db4b3e9ca80cd6d182dc5830338911547b47d19b561a6ca58df30701462270243484cbe7a1731ba6d14f3b7d57d33d476792bc7ec38e0d24441fca250994e934f76630696800e8c9fee72a88005c4af56dfb3de5068c6cafa4a72d5a8a6e3099fabe36a43", 0x82}, {&(0x7f0000000800)="94aa7c3819aceb9c8f2c3cc07be02292c0edbbcbaedcac60139325c640bdfcb8", 0x20}], 0xa, &(0x7f0000000900)=[{0xa0, 0x1ff, 0xfffffffffffffff8, "e3b3aded3aaaa662e9f698d0f03c521aecb595da15f63ca27cad5fd6e50703a97d6b435f383b957b503f01cbf931a44f60cfc27f0e31171e220c58744b3229a6d6e826e4801fe2d663b6a517b3d779c5e92235fb22b3adffc79c164465bcd393de19c6dc74476c574544d95b4a39b85918099a6154b54dd4f26efabc0e1f337ac4dc60bc70421385d6df"}, {0xb0, 0x117, 0x0, "93581a0284b8ec220b0779726503c08773ed3cb6148b2ffafa8185e3a47843e0a35416306d069d8487d306d106848c53e1904d67505abbed427c2e1aa266112267ddab35a7cae058f938c5a6f796fc20b0c8816f77d128e853d5f9a19af3743f7e1e96a6c84df6014266b7323842ae132e06119e892bba7d494b6139e150610a491dd248a6927a8ba18ebc598f827a07a3cd6b9c1d5cccab8cde3fe9a413f7"}, {0xa0, 0x118, 0x101, "8e357cec5efc031940094095449d8a2597ae2223a5220a0ee5c64465cfd3990ffbe71216f1403edda7b6a8ff96f6f09e81106f7fcdcdac494171e7bec9fdf7b82ac5fc00eccf67415703c01b3156085282cf39d3d5c19e4116d3116f69a7994c9665aa7171b147d79a7af7f93440ab21883670abe12284d0754ce348f1f68e312cf6ca6dd5e39e8533"}, {0x20, 0xff, 0x6, "6c96f2f331a83aeb5d"}, {0x28, 0x11b, 0x6, "dfd30fceb6f87a6e0f27e89c006241bc12248ba36f"}, {0x78, 0x10a, 0x401, "3b69a9c36c7be28e2161f27e6fd86984762c53f1f1454280fc44748db5cb683b3cf6c3bb3ba7f51fafb7c71eae8e2ede4a87773bbaeb49b8a71cb6c577175b25448e6f8573e96ff4fdafec9a9833d8eddf8d07ca78f84b77604154850c9bbbdafe21185e528469"}, {0x28, 0x10b, 0x5, "c3aeba517c023950d7bca6ead00dcf77427215371f"}, {0x110, 0x10f, 0x9, "28dc8c892d67f11a7dedd3a2b210378c66b5f5ee4dd6588bdd946f4913a9390ec78b3c574d8bd84d078796cfa2c8f025fce01aaf053c60fa91f085e2449e5f43dd5b945297824fe9f8a4be7b1cf26cd169a1731a42cf49acaf008542b6fbe47995dc38eadb88411cfc3bf58314255315ee71b60da6118713c078cb0c2d5c460cabd0ecc33cb09573ff6ee103f13fe5bf332471b8a9810c93ac53a2632220c35d954993362f8961323ef2405f7f498e255f56c79e5d70dd54dfbef8263b4d6b3f65522687f427b8ab2c1d082bb6fe38225f926a28d869035a48ac82a95f27cdb32d35669fb0d5b8e107e37bc8bf8f51b0fb6dc14f8cf93b2016"}], 0x3e8}, 0x4000000) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x7, 0x9, 0x3, 0x401, 0x1b3, 0xffffffffffffff9c, 0x4, [], 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000100)=0x1ca7c99d) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000000c0)=r3, 0x4) 04:01:42 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/110, 0x6e}, {&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/37, 0x25}], 0x6, &(0x7f0000000840)=""/204, 0xcc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x17, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, 0x0, 0x38}, [@exit]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x51, &(0x7f0000000500)=""/81, 0x0, 0x3, [], r3, 0x5, r2, 0x8, &(0x7f0000000980)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x1, 0x0, 0xffffffff00000001}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:01:42 executing program 3: socket$kcm(0x2b, 0x200000000000001, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r5 = openat$cgroup_ro(r2, &(0x7f0000000280)='memory.events\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000380)=0x10001) perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x3ff, 0x2, 0x1, 0x1, 0x0, 0x3a, 0x20, 0x7, 0x6, 0x6, 0x4, 0x5, 0x300000000, 0x8000, 0x0, 0x400, 0x2, 0x7, 0x2, 0x4000, 0xffffffff, 0x2, 0x100000000, 0x5, 0x3, 0x7, 0x0, 0xff, 0x850, 0x5, 0x3, 0xffffffffffff82b4, 0x7ff, 0x0, 0x0, 0x2, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000240), 0x6}, 0x1, 0x6, 0x5, 0x4, 0x1, 0x1, 0x800}, 0xffffffffffffffff, 0xc, 0xffffffffffffff9c, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000200)=r4, 0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000540)={0x0, 0x70, 0x9c62, 0x60, 0x0, 0x0, 0x0, 0x401, 0x80, 0xf, 0x7fffffff, 0x1, 0x2, 0xffffffffffffffff, 0x0, 0x7, 0x2, 0x0, 0x0, 0x0, 0x8, 0xd7, 0x4, 0x9, 0xf6, 0x20, 0x18, 0x4, 0x5, 0x5, 0x4, 0x800, 0x4, 0x7, 0xcec7, 0x3, 0x50a8, 0x472, 0x0, 0x7, 0x4, @perf_bp={0x0, 0x9}, 0x20, 0x1000, 0x0, 0x0, 0x89dc, 0x7, 0x5}) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0xfffffffffffffffb, 0x9f, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0xc43a, 0x3, 0x100000000, 0xdda, 0x0, 0x1f, 0x5, 0x3, 0x0, 0x4, 0x8, 0x80, 0x0, 0x3, 0x4, 0x0, 0x0, 0x1a1ae1dd, 0x800, 0x7f, 0x8001, 0x0, 0x4, 0x0, 0x8, 0x745, 0x7, 0xfffffffffffffffa, 0x0, 0x7, 0x0, @perf_config_ext={0x6, 0x7}, 0x802, 0x0, 0x0, 0xf, 0x200, 0x2, 0x4}, 0x0, 0x0, r2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000480)={0x0, r2, 0x0, 0x1}, 0x14) r6 = socket$kcm(0x11, 0x3, 0x300) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000100)=r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x541b, 0x70d000) close(r0) [ 406.257509][T11525] Disabling lock debugging due to kernel taint [ 406.414627][T11525] Kernel panic - not syncing: panic_on_warn set ... [ 406.421299][T11525] CPU: 1 PID: 11525 Comm: syz-executor.4 Tainted: G B 5.2.0-rc2+ #23 [ 406.430858][T11525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.441062][T11525] Call Trace: [ 406.444575][T11525] dump_stack+0x172/0x1f0 [ 406.449100][T11525] panic+0x2cb/0x744 [ 406.453021][T11525] ? __warn_printk+0xf3/0xf3 [ 406.457624][T11525] ? kfree_skb_list+0x5d/0x60 [ 406.462309][T11525] ? preempt_schedule+0x4b/0x60 [ 406.467187][T11525] ? ___preempt_schedule+0x16/0x18 [ 406.472474][T11525] ? trace_hardirqs_on+0x5e/0x220 [ 406.477523][T11525] ? kfree_skb_list+0x5d/0x60 [ 406.482223][T11525] end_report+0x47/0x4f [ 406.486393][T11525] ? kfree_skb_list+0x5d/0x60 [ 406.491456][T11525] __kasan_report.cold+0xe/0x40 [ 406.496414][T11525] ? kfree_skb_list+0x5d/0x60 [ 406.501112][T11525] kasan_report+0x12/0x20 [ 406.505482][T11525] __asan_report_load8_noabort+0x14/0x20 [ 406.511132][T11525] kfree_skb_list+0x5d/0x60 [ 406.515658][T11525] ip6_fragment+0x1ef4/0x2680 [ 406.520362][T11525] ? ip6_forward_finish+0x570/0x570 [ 406.525872][T11525] ? ip6_forward+0x3870/0x3870 [ 406.530659][T11525] ? ip6_mtu+0x2e6/0x460 [ 406.535103][T11525] ? lock_downgrade+0x880/0x880 [ 406.539984][T11525] ? ip6_mtu+0x2eb/0x460 [ 406.544526][T11525] ? __rcu_read_unlock+0x72/0x130 [ 406.549584][T11525] __ip6_finish_output+0x577/0xaa0 [ 406.554721][T11525] ip6_finish_output+0x38/0x1f0 [ 406.559615][T11525] ip6_output+0x235/0x7f0 [ 406.564078][T11525] ? ip6_finish_output+0x1f0/0x1f0 [ 406.569307][T11525] ? __ip6_finish_output+0xaa0/0xaa0 [ 406.574617][T11525] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 406.580186][T11525] ip6_local_out+0xbb/0x1b0 [ 406.584724][T11525] ip6_send_skb+0xbb/0x350 [ 406.589168][T11525] ip6_push_pending_frames+0xc8/0xf0 [ 406.594463][T11525] rawv6_sendmsg+0x2993/0x35e0 [ 406.599244][T11525] ? rawv6_getsockopt+0x150/0x150 [ 406.604446][T11525] ? aa_profile_af_perm+0x320/0x320 [ 406.609684][T11525] ? tomoyo_check_inet_address+0xf7/0x740 [ 406.615457][T11525] ? tomoyo_unix_entry+0x5d0/0x5d0 [ 406.620600][T11525] ? iov_iter_init+0x8b/0x220 [ 406.625907][T11525] ? iov_iter_init+0x99/0x220 [ 406.631929][T11525] ? ___might_sleep+0x163/0x280 [ 406.636797][T11525] ? __might_sleep+0x95/0x190 [ 406.641505][T11525] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 406.647063][T11525] inet_sendmsg+0x141/0x5d0 [ 406.651572][T11525] ? inet_sendmsg+0x141/0x5d0 [ 406.656358][T11525] ? ipip_gro_receive+0x100/0x100 [ 406.661382][T11525] sock_sendmsg+0xd7/0x130 [ 406.665802][T11525] ___sys_sendmsg+0x803/0x920 [ 406.670492][T11525] ? copy_msghdr_from_user+0x430/0x430 [ 406.675953][T11525] ? lock_downgrade+0x880/0x880 [ 406.680807][T11525] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.687088][T11525] ? kasan_check_read+0x11/0x20 [ 406.691945][T11525] ? __fget+0x381/0x550 [ 406.696119][T11525] ? __fget_light+0x1a9/0x230 [ 406.700809][T11525] ? __fdget+0x1b/0x20 [ 406.704885][T11525] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 406.711140][T11525] __sys_sendmsg+0x105/0x1d0 [ 406.715746][T11525] ? __ia32_sys_shutdown+0x80/0x80 [ 406.720870][T11525] ? __sys_sendmsg+0x2f/0x1d0 [ 406.725561][T11525] __x64_sys_sendmsg+0x78/0xb0 [ 406.730441][T11525] do_syscall_64+0xfd/0x680 [ 406.734994][T11525] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.740886][T11525] RIP: 0033:0x4592c9 [ 406.744783][T11525] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 406.764420][T11525] RSP: 002b:00007f0222529c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 406.772842][T11525] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 406.780828][T11525] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000006 [ 406.788828][T11525] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 406.796890][T11525] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f022252a6d4 [ 406.804959][T11525] R13: 00000000004c6f76 R14: 00000000004dc0b0 R15: 00000000ffffffff [ 406.814395][T11525] Kernel Offset: disabled [ 406.818918][T11525] Rebooting in 86400 seconds..